Description
MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
Exploits
References
secalert@redhat.com
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.htmlsecalert@redhat.com
http://bugs.mysql.com/bug.php?id=17667secalert@redhat.com
http://rst.void.ru/papers/advisory39.txtsecalert@redhat.com
http://secunia.com/advisories/19034secalert@redhat.com
http://secunia.com/advisories/19502secalert@redhat.com
http://secunia.com/advisories/19814secalert@redhat.com
http://secunia.com/advisories/20241secalert@redhat.com
http://secunia.com/advisories/20253secalert@redhat.com
http://secunia.com/advisories/20333secalert@redhat.com
http://secunia.com/advisories/20625secalert@redhat.com
http://secunia.com/advisories/30351secalert@redhat.com
http://securitytracker.com/id?1015693secalert@redhat.com
http://www.debian.org/security/2006/dsa-1071secalert@redhat.com
http://www.debian.org/security/2006/dsa-1073secalert@redhat.com
http://www.debian.org/security/2006/dsa-1079secalert@redhat.com
http://www.mandriva.com/security/advisories?name=MDKSA-2006:064secalert@redhat.com
http://www.redhat.com/support/errata/RHSA-2006-0544.htmlsecalert@redhat.com
http://www.redhat.com/support/errata/RHSA-2007-0083.htmlsecalert@redhat.com
http://www.redhat.com/support/errata/RHSA-2008-0364.htmlsecalert@redhat.com
http://www.securityfocus.com/bid/16850secalert@redhat.com
http://www.ubuntu.com/usn/usn-274-2secalert@redhat.com
http://www.vupen.com/english/advisories/2006/0752secalert@redhat.com
https://exchange.xforce.ibmcloud.com/vulnerabilities/24966secalert@redhat.com
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915secalert@redhat.com
https://usn.ubuntu.com/274-1/af854a3a-2127-422b-91ae-364da2661108
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.htmlaf854a3a-2127-422b-91ae-364da2661108
http://bugs.mysql.com/bug.php?id=17667af854a3a-2127-422b-91ae-364da2661108
http://rst.void.ru/papers/advisory39.txtaf854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19034af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19502af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19814af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20241af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20253af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20333af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20625af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/30351af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015693af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1071af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1073af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1079af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:064af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0544.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0083.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0364.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/16850af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-274-2af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/0752af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/24966af854a3a-2127-422b-91ae-364da2661108
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/274-1/