SB2016082006 - Use-after-free in CAPTTOFU DBD-mysql
Published: August 20, 2016 Updated: August 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2015-8949)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login.
Remediation
Install update from vendor's website.
References
- http://www.debian.org/security/2016/dsa-3635
- http://www.openwall.com/lists/oss-security/2016/07/25/13
- http://www.openwall.com/lists/oss-security/2016/07/27/1
- http://www.securityfocus.com/bid/92118
- https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html
- https://github.com/perl5-dbi/DBD-mysql/blob/4.033_01/Changes
- https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156
- https://github.com/perl5-dbi/DBD-mysql/pull/45
- https://security.gentoo.org/glsa/201701-51