Oracle MySQL 'COM_FIELD_LIST' Command Buffer Overflow Vulnerability
Publish date: July 21, 2015
Severity: MEDIUM
CVE Identifier: CVE-2010-1850
Advisory Date: JUL 21, 2015
DESCRIPTION
Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
TREND MICRO PROTECTION INFORMATION
Apply associated Trend Micro DPI Rules.
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1004177
Trend Micro Deep Security DPI Rule Name: 1004177 - Oracle MySQL 'COM_FIELD_LIST' Command Buffer Overflow Vulnerability
AFFECTED SOFTWARE AND VERSION
- MYSQL MYSQL 5.0
- MYSQL MYSQL 5.0.0
- MYSQL MYSQL 5.0.0.0
- MYSQL MYSQL 5.0.10
- MYSQL MYSQL 5.0.10a
- MYSQL MYSQL 5.0.11
- MYSQL MYSQL 5.0.12
- MYSQL MYSQL 5.0.13
- MYSQL MYSQL 5.0.14
- MYSQL MYSQL 5.0.15
- MYSQL MYSQL 5.0.15a
- MYSQL MYSQL 5.0.16
- MYSQL MYSQL 5.0.16a
- MYSQL MYSQL 5.0.17
- MYSQL MYSQL 5.0.17a
- MYSQL MYSQL 5.0.18
- MYSQL MYSQL 5.0.19
- MYSQL MYSQL 5.0.1a
- MYSQL MYSQL 5.0.2
- MYSQL MYSQL 5.0.20
- MYSQL MYSQL 5.0.20a
- MYSQL MYSQL 5.0.22
- MYSQL MYSQL 5.0.21
- MYSQL MYSQL 5.0.23
- MYSQL MYSQL 5.0.24
- MYSQL MYSQL 5.0.24a
- MYSQL MYSQL 5.0.27
- MYSQL MYSQL 5.0.3
- MYSQL MYSQL 5.0.33
- MYSQL MYSQL 5.0.37
- MYSQL MYSQL 5.0.3a
- MYSQL MYSQL 5.0.4
- MYSQL MYSQL 5.0.41
- MYSQL MYSQL 5.0.45
- MYSQL MYSQL 5.0.45b
- MYSQL MYSQL 5.0.4a
- MYSQL MYSQL 5.0.5
- MYSQL MYSQL 5.0.5.0.21
- MYSQL MYSQL 5.0.51a
- MYSQL MYSQL 5.0.51b
- MYSQL MYSQL 5.0.6
- MYSQL MYSQL 5.0.67
- MYSQL MYSQL 5.0.7
- MYSQL MYSQL 5.0.75
- MYSQL MYSQL 5.0.77
- MYSQL MYSQL 5.0.8
- MYSQL MYSQL 5.0.82
- MYSQL MYSQL 5.0.83
- MYSQL MYSQL 5.0.84
- MYSQL MYSQL 5.0.85
- MYSQL MYSQL 5.0.86
- MYSQL MYSQL 5.0.87
- MYSQL MYSQL 5.0.88
- MYSQL MYSQL 5.0.89
- MYSQL MYSQL 5.0.9
- MYSQL MYSQL 5.0.90
- MYSQL MYSQL 5.0.91
- MYSQL MYSQL 5.1
- MYSQL MYSQL 5.1.1
- MYSQL MYSQL 5.1.10
- MYSQL MYSQL 5.1.11
- MYSQL MYSQL 5.1.12
- MYSQL MYSQL 5.1.13
- MYSQL MYSQL 5.1.14
- MYSQL MYSQL 5.1.15
- MYSQL MYSQL 5.1.16
- MYSQL MYSQL 5.1.17
- MYSQL MYSQL 5.1.2
- MYSQL MYSQL 5.1.23
- MYSQL MYSQL 5.1.23a
- MYSQL MYSQL 5.1.3
- MYSQL MYSQL 5.1.30
- MYSQL MYSQL 5.1.31
- MYSQL MYSQL 5.1.32
- MYSQL MYSQL 5.1.33
- MYSQL MYSQL 5.1.34
- MYSQL MYSQL 5.1.35
- MYSQL MYSQL 5.1.37
- MYSQL MYSQL 5.1.36
- MYSQL MYSQL 5.1.38
- MYSQL MYSQL 5.1.39
- MYSQL MYSQL 5.1.4
- MYSQL MYSQL 5.1.40
- MYSQL MYSQL 5.1.41
- MYSQL MYSQL 5.1.42
- MYSQL MYSQL 5.1.43
- MYSQL MYSQL 5.1.44
- MYSQL MYSQL 5.1.45
- MYSQL MYSQL 5.1.46
- MYSQL MYSQL 5.1.5
- MYSQL MYSQL 5.1.5a
- MYSQL MYSQL 5.1.6
- MYSQL MYSQL 5.1.7
- MYSQL MYSQL 5.1.8
- MYSQL MYSQL 5.1.9
Featured Stories
- Unveiling AI Agent Vulnerabilities Part IV: Database Access VulnerabilitiesHow can attackers exploit weaknesses in database-enabled AI agents? This research explores how SQL generation vulnerabilities, stored prompt injection, and vector store poisoning can be weaponized by attackers for fraudulent activities.Read more
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more