SB2016112905 - Use-after-free in CAPTTOFU DBD-mysql
Published: November 29, 2016 Updated: August 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2016-1251)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2016/11/28/2
- http://www.securityfocus.com/bid/94573
- https://anonscm.debian.org/cgit/pkg-perl/packages/libdbd-mysql-perl.git/commit/?id=a8b97e4713391b1f8beffbfddac483c276feaff1
- https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1
- https://security.gentoo.org/glsa/201701-51
- https://tracker.debian.org/news/819888