CVE-2009-0819 : Detail

CVE-2009-0819

4.72%V3
Network
2009-03-05
01h00 +00:00
2017-09-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4 AV:N/AC:L/Au:S/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 32838

Publication date : 2009-02-13 23h00 +00:00
Author : Shane Bester
EDB Verified : Yes

source: https://www.securityfocus.com/bid/33972/info MySQL is prone to a remote denial-of-service vulnerability because it fails to handle certain XPath expressions. An attacker can exploit this issue to crash the application, denying access to legitimate users. This issue affects: MySQL 5.1.31 and earlier MySQL 6.0.9 and earlier select updatexml('','0/a',''); select extractvalue('','0/a');

Products Mentioned

Configuraton 0

Mysql>>Mysql >> Version To (including) 5.1.32-bzr

Mysql>>Mysql >> Version 5.1.23

Mysql>>Mysql >> Version 5.1.31

Mysql>>Mysql >> Version 6.0.9

    Mysql>>Mysql >> Version 6.0.10-bzr

      Oracle>>Mysql >> Version 5.1

      Oracle>>Mysql >> Version 5.1.1

      Oracle>>Mysql >> Version 5.1.2

      Oracle>>Mysql >> Version 5.1.3

      Oracle>>Mysql >> Version 5.1.10

      Oracle>>Mysql >> Version 5.1.11

      Oracle>>Mysql >> Version 5.1.12

      Oracle>>Mysql >> Version 5.1.13

      Oracle>>Mysql >> Version 5.1.14

      Oracle>>Mysql >> Version 5.1.15

      Oracle>>Mysql >> Version 5.1.16

      Oracle>>Mysql >> Version 5.1.17

      Oracle>>Mysql >> Version 5.1.18

      Oracle>>Mysql >> Version 5.1.19

      Oracle>>Mysql >> Version 5.1.20

      Oracle>>Mysql >> Version 5.1.21

      Oracle>>Mysql >> Version 5.1.22

      Oracle>>Mysql >> Version 5.1.23

      Oracle>>Mysql >> Version 5.1.24

      Oracle>>Mysql >> Version 5.1.25

      Oracle>>Mysql >> Version 5.1.26

      Oracle>>Mysql >> Version 5.1.27

      Oracle>>Mysql >> Version 5.1.28

      Oracle>>Mysql >> Version 5.1.29

      Oracle>>Mysql >> Version 5.1.30

      Oracle>>Mysql >> Version 5.1.31

      Oracle>>Mysql >> Version 6.0.0

      Oracle>>Mysql >> Version 6.0.1

      Oracle>>Mysql >> Version 6.0.2

      Oracle>>Mysql >> Version 6.0.3

      Oracle>>Mysql >> Version 6.0.4

      References

      http://secunia.com/advisories/34115
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://www.vupen.com/english/advisories/2009/0594
      Tags : vdb-entry, x_refsource_VUPEN
      http://bugs.mysql.com/bug.php?id=42495
      Tags : x_refsource_CONFIRM
      http://www.securityfocus.com/bid/33972
      Tags : vdb-entry, x_refsource_BID
      http://www.securitytracker.com/id?1021786
      Tags : vdb-entry, x_refsource_SECTRACK