Note: This is an archival copy of Security Sun Alert 236703 as previously published on
Latest version of this security advisory is available from as Sun Alert 1019188.1.
Article ID : 1019188.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2008-06-29
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Multiple Security Vulnerabilities May Affect MySQL 4.0.x Bundled With Solaris 10


Release Phase

Bug Id

Solaris 10 Operating System

Date of Preliminary Release

Date of Resolved Release

Multiple Security Vulnerabilities in MySQL 4.0.x (see below for details)

1. Impact

Multiple security vulnerabilities in the "MySQL" package, an open source database package bundled with Solaris 10 (see mysqld(1)), may result in one or more of the following issues:

1. A stack-based buffer overflow in the "init_syms" function in MySQL 4.0 prior to 4.0.25 may allow a remote authenticated users with the ability to create user-defined functions to execute arbitrary code via a long "function_name"  field.  For additional information see:
2.  The "check_connection" function in in MySQL 4.0.x through 4.0.26 may allow  a remote unauthorized users to read portions of memory via a username without a trailing null byte.  This may result in a buffer over-read. For additional information see:
3. ""  in MySQL 4.0.x through 4.0.26 may allow a remote unauthorized users to obtain sensitive information via a "COM_TABLE_DUMP" request with an incorrect packet length that  includes portions of memory in an error message. For additional information see:

2. Contributing Factors

These issues can occur in the following :

SPARC Platform
  • Solaris 10 without patch 120292-02
x86 Platform
  • Solaris 10 without patch 120293-02
Note: Solaris 8 and Solaris 9 are not impacted by these issues.

In order for a system to be vulnerable to the issues mentioned above, (with the exception of  issue number 3),  the "MySQL" server daemon (mysqld(1)) must be running on the system. To determine if the "MySQL" server daemon is running on the system, the following command can be executed:

    $ pgrep -lf mysqld || echo "System is not affected."
    107098 /usr/sfw/sbin/mysqld

3. Symptoms

There are no predictable symptoms that would indicate the described issues have been exploited.

4. Workaround

There is no workaround for these issues.

5. Resolution

These issues is addressed in the following releases:

SPARC Platform
  • Solaris 10 with patch 120292-02 or later
x86 Platform
  • Solaris 10 with patch 120293-02 or later

For more information on Security Sun Alerts, see 1009886.1

This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements.

Copyright 2000-2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.

Modification History
30-Jun-2008: Updated Contributing Factors and Resolution sections. Resolved.



This solution has no attachment