|
|
CVE-ID | ||
---|---|---|
CVE-2001-1275 |
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
|
Description | ||
MySQL before 3.23.31 allows users with a MySQL account to use the SHOW GRANTS command to obtain the encrypted administrator password from the mysql.user table and possibly gain privileges via password cracking. | ||
References | ||
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete. | ||
|
||
Assigning CNA | ||
MITRE Corporation | ||
Date Record Created | ||
20020501 | Disclaimer: The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE. | |
Phase (Legacy) | ||
Proposed (20020502) | ||
Votes (Legacy) | ||
ACCEPT(2) Cole, Green MODIFY(1) Frech NOOP(3) Cox, Foat, Wall REVIEWING(1) Christey |
||
Comments (Legacy) | ||
Christey> CALDERA:CSSA-2001-006.0 specifically says they're not vulnerable to this issue. So, do we remove the reference (because they aren't affected by this problem), or do we keep the reference because it specifically mentions this issue? Need to review the other advisories; they don't necessarily have the details to know whether they're addressing this problem or not (the overflow mentioned in these refs is covered by CVE-2001-1274). MANDRAKE:MDKSA-2001:014 clearly identifies this issue. FREEBSD:FreeBSD-SA-01:16 discussed "remote vulerabilities" (plural), which *could* include this issue, but it is not absolutely certain. REDHAT:RHSA-2001:003 refers to "information protection issues," but that's not clear enough either. Thanks to John Segura of secureinfo.com for noticing this issue. CHANGE> [Frech changed vote from REVIEWING to MODIFY] Frech> XF:mysql-show-grants-password(9996) |
||
Proposed (Legacy) | ||
20020502 | ||
This is an record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. | ||
You can also search by reference using the CVE Reference Maps.
|
||
For More Information: CVE Request Web Form (select "Other" from dropdown) |