Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-3963Use of Externally-Controlled Format String in Mysql

Severity
4.0MEDIUMNVD
EPSS
5.4%
top 9.82%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 11
Latest updateMay 2

Description

MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 8.0 | Impact: 2.9

Affected Packages2 packages

NVDmysql/mysql22 versions+21
NVDoracle/mysql42 versions+41

Patches

🔴Vulnerability Details

1
GHSA
GHSA-hp64-jg7m-f9mq: MySQL 52022-05-02

💥Exploits & PoCs

1
Exploit-DB
MySQL 6.0.4 - Empty Binary String Literal Remote Denial of Service2008-03-28

📋Vendor Advisories

3
Ubuntu
MySQL vulnerabilities2012-03-12
Ubuntu
MySQL vulnerabilities2008-11-17
Red Hat
MySQL: Using an empty binary value leads to server crash2008-08-10

💬Community

2
Bugzilla
CVE-2008-3963 MySQL: Using an empty binary value leads to server crash2008-12-17
Bugzilla
CVE-2008-3963 MySQL: Using an empty binary value leads to server crash2008-09-12
CVE-2008-3963 — Mysql vulnerability | cvebase