Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login.
References
Link | Resource |
---|---|
https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/07/25/13 | Mailing List Third Party Advisory |
https://github.com/perl5-dbi/DBD-mysql/pull/45 | Issue Tracking Patch |
http://www.openwall.com/lists/oss-security/2016/07/27/1 | Mailing List Third Party Advisory |
http://www.debian.org/security/2016/dsa-3635 | Third Party Advisory |
https://github.com/perl5-dbi/DBD-mysql/blob/4.033_01/Changes | Release Notes |
https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156 | Issue Tracking Patch |
http://www.securityfocus.com/bid/92118 | |
https://security.gentoo.org/glsa/201701-51 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-08-19 14:59
Updated : 2017-06-30 18:29
NVD link : CVE-2015-8949
Mitre link : CVE-2015-8949
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
debian
- debian_linux
dbd-mysql_project
- dbd-mysql