CVE-2002-1374 (CNNVD-200212-053)

HIGH 有利用代码
中文标题:
MySQL COM_CHANGE_USER功能口令认证缺陷漏洞
英文标题:
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attacke...
CVSS分数: 7.5
发布时间: 2004-09-01 04:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Oracle MySQL是美国甲骨文(Oracle)公司的一套开源的关系数据库管理系统。 MySQL的密码验证机制存在缺陷,本地或远程攻击者可能利用这个漏洞以其他数据库帐号访问数据库,因为可以劫持数据库root用户帐号,所以攻击者可能完全控制数据库,结合系统的其他配置问题(比如有可写的CGI目录,或MySQL本身以root用户启动),可能对操作系统本身造成进一步危害。此漏洞本身并不是新发现的,而是对老漏洞的修补不彻底所致。在2000年02月,Robert van der Meulen发现MySQL系统中的密码验证系统存在一个缺陷(BUGTRAQ_ID:975 ),MySQL挑战应答算法在检查HASH后的口令时根据客户端提供的应答长度来定,因此如果客户端发送只有一个字符的应答,MySQL会只检查一个字节,因为MySQL实现的HASH算法每个HASH后的字符只有32种可能,这意味着最多只要尝试32次就可以给予服务端正确的应答。修正这个错误的时候,MySQL项目组只简单在服务端接受数据库登录连接的代码中加入了检查HASH后的口令长度必须为8个字节,但是却没有对COM_CHANGE_USER命令的处理过程中加入这个检查。因此攻击者使用合法的MySQL帐户仍旧可以尝试多次未授权访问数据库。本地用户意味着可以利用mysql root帐户控制所有数据库。

英文描述:

The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.

CWE类型:
(暂无数据)
标签:
remote unix Andi OSVDB-8887
受影响产品
厂商 产品 版本 版本范围 平台 CPE
oracle mysql 3.22.26 - - cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*
oracle mysql 3.22.27 - - cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*
oracle mysql 3.22.28 - - cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*
oracle mysql 3.22.29 - - cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*
oracle mysql 3.22.30 - - cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*
oracle mysql 3.22.32 - - cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*
oracle mysql 3.23.2 - - cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*
oracle mysql 3.23.3 - - cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*
oracle mysql 3.23.4 - - cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*
oracle mysql 3.23.5 - - cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*
oracle mysql 3.23.8 - - cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*
oracle mysql 3.23.9 - - cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*
oracle mysql 3.23.10 - - cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*
oracle mysql 3.23.23 - - cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*
oracle mysql 3.23.24 - - cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*
oracle mysql 3.23.25 - - cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*
oracle mysql 3.23.26 - - cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*
oracle mysql 3.23.27 - - cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*
oracle mysql 3.23.28 - - cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*
oracle mysql 3.23.29 - - cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*
oracle mysql 3.23.30 - - cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*
oracle mysql 3.23.31 - - cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*
oracle mysql 3.23.34 - - cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*
oracle mysql 3.23.36 - - cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*
oracle mysql 3.23.37 - - cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*
oracle mysql 3.23.38 - - cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*
oracle mysql 3.23.39 - - cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*
oracle mysql 3.23.40 - - cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*
oracle mysql 3.23.41 - - cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*
oracle mysql 3.23.42 - - cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*
oracle mysql 3.23.43 - - cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*
oracle mysql 3.23.44 - - cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*
oracle mysql 3.23.45 - - cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*
oracle mysql 3.23.46 - - cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*
oracle mysql 3.23.47 - - cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*
oracle mysql 3.23.48 - - cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*
oracle mysql 3.23.49 - - cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*
oracle mysql 3.23.50 - - cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*
oracle mysql 3.23.51 - - cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*
oracle mysql 3.23.52 - - cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*
oracle mysql 3.23.53 - - cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*
oracle mysql 3.23.53a - - cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*
oracle mysql 4.0.0 - - cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*
oracle mysql 4.0.1 - - cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
oracle mysql 4.0.2 - - cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
oracle mysql 4.0.3 - - cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
oracle mysql 4.0.5a - - cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
symantec_veritas netbackup_advanced_reporter 3.4 - - cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:3.4:*:*:*:*:*:*:*
symantec_veritas netbackup_advanced_reporter 4.5 - - cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5:*:*:*:*:*:*:*
symantec_veritas netbackup_advanced_reporter 4.5_fp1 - - cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp1:*:*:*:*:*:*:*
symantec_veritas netbackup_advanced_reporter 4.5_fp2 - - cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp2:*:*:*:*:*:*:*
symantec_veritas netbackup_advanced_reporter 4.5_fp3 - - cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp3:*:*:*:*:*:*:*
symantec_veritas netbackup_advanced_reporter 4.5_mp1 - - cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp1:*:*:*:*:*:*:*
symantec_veritas netbackup_advanced_reporter 4.5_mp2 - - cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp2:*:*:*:*:*:*:*
symantec_veritas netbackup_advanced_reporter 4.5_mp3 - - cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp3:*:*:*:*:*:*:*
symantec_veritas netbackup_global_data_manager 4.5 - - cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5:*:*:*:*:*:*:*
symantec_veritas netbackup_global_data_manager 4.5_fp1 - - cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp1:*:*:*:*:*:*:*
symantec_veritas netbackup_global_data_manager 4.5_fp2 - - cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp2:*:*:*:*:*:*:*
symantec_veritas netbackup_global_data_manager 4.5_fp3 - - cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp3:*:*:*:*:*:*:*
symantec_veritas netbackup_global_data_manager 4.5_mp1 - - cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp1:*:*:*:*:*:*:*
symantec_veritas netbackup_global_data_manager 4.5_mp2 - - cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp2:*:*:*:*:*:*:*
symantec_veritas netbackup_global_data_manager 4.5_mp3 - - cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20021212 Advisory 04/2002: Multiple MySQL vulnerabilities mailing-list
cve.org
访问
20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql) mailing-list
cve.org
访问
CLSA-2002:555 vendor-advisory
cve.org
访问
ESA-20021213-033 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
DSA-212 vendor-advisory
cve.org
访问
RHSA-2002:288 vendor-advisory
cve.org
访问
MDKSA-2002:087 vendor-advisory
cve.org
访问
RHSA-2003:166 vendor-advisory
cve.org
访问
mysql-comchangeuser-password-bypass(10847) vdb-entry
cve.org
访问
GLSA-200212-2 vendor-advisory
cve.org
访问
SUSE-SA:2003:003 vendor-advisory
cve.org
访问
RHSA-2002:289 vendor-advisory
cve.org
访问
2002-0086 vendor-advisory
cve.org
访问
6373 vdb-entry
cve.org
访问
IMNX-2003-7+-008-01 vendor-advisory
cve.org
访问
ExploitDB EDB-22084 EXPLOIT
exploitdb
访问
Download Exploit EDB-22084 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2002-1374 ADVISORY
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2004-09-01 04:00:00
修改时间:
2024-08-08 03:19:28
创建时间:
2025-11-11 15:32:17
更新时间:
2025-11-11 16:16:47
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2002-1374 2025-11-11 15:17:24 2025-11-11 07:32:17
NVD nvd_CVE-2002-1374 2025-11-11 14:50:28 2025-11-11 07:41:03
CNNVD cnnvd_CNNVD-200212-053 2025-11-11 15:08:42 2025-11-11 07:48:49
EXPLOITDB exploitdb_EDB-22084 2025-11-11 15:05:48 2025-11-11 08:16:47
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:16:47
references_count: 16 → 19; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 16 -> 19
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:48:49
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-200212-053; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-200212-053
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:03
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 62; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 62
  • data_sources: ['cve'] -> ['cve', 'nvd']