2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-2573" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-08-16T04:00:00.000" ,
2024-11-21 23:11:37 +00:00
"lastModified" : "2024-11-20T23:59:52.303" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\\) character."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-21 23:11:37 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-21 23:11:37 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFEDB808-A8D8-403E-9103-AB486C793EF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0EF35900-4051-4E07-9BFA-347BEAB8AB67"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B77A2761-2B44-4061-9C29-A54F90A1AD83"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "754B78F2-A03C-40BE-812B-F5E57B93D20B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41BEAD26-ADDC-4FC6-A493-584315183936"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "153E8DFB-4197-4117-87C6-C0FBE3C05600"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "765BF98E-7AB1-45EA-9935-2C311E621211"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22408224-0634-4CC6-888F-892E9D932CE3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2B2646B4-593E-4AC9-8292-1AD805632DC0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*" ,
"matchCriteriaId" : "4D57E557-7F6D-4618-86AC-B10C08341900"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*" ,
"matchCriteriaId" : "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8EC10CD2-B9A3-46DD-839E-C7FB6647155F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5EC21395-4C78-4343-9452-578B24C2656D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*" ,
"matchCriteriaId" : "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5032D74E-CC8D-4217-AEF0-98DCD1820AE9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B3340604-0D38-4494-847B-E9E8B0026A28"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC117BF1-3127-477A-9500-C9A32596ED8E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FED5BA55-FF4F-4F89-89B1-554624DDA1AA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4A0C43BB-81C6-496F-AC7B-61382DE76B71"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*" ,
"matchCriteriaId" : "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB7196E5-8483-4872-A78A-8BE7EC551CA6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*" ,
"matchCriteriaId" : "14DDA057-D211-42BD-B8AF-F250F1C5B88C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "32CA2F70-77E4-4280-B845-4CE5774162C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA788329-9A66-49EA-B7E4-E465C0E7E320"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*" ,
"matchCriteriaId" : "19001041-22C4-4D2C-A918-378DACBB1DF4"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=112360618320729&w=2" ,
"source" : "cve@mitre.org"
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738" ,
"source" : "cve@mitre.org"
2024-11-21 23:11:37 +00:00
} ,
{
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=112360618320729&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}