Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

DB:MYSQL:SELECT-SUB-DOS

Severity

Medium

Recommended

No

Category

DB

Keywords

SELECT Subquery Denial of Service

Release Date

2010/02/17

Update Number

1613

Supported Platforms

idp-4.0.110090709+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

MySQL: SELECT Subquery Denial of Service


This signature detects attempts to exploit a known vulnerability against Sun MySQL Database. A successful attack can result in a denial-of-service condition. Sun Microsystems MySQL prior to 5.0.88 and Sun Microsystems MySQL prior to 5.1.41 are affected.

Extended Description

MySQL is prone to multiple remote denial-of-service vulnerabilities because it fails to handle certain SQL expressions. An attacker can exploit these issues to crash the application, denying access to legitimate users. Versions prior to MySQL 5.0.88 and 5.1.41 are vulnerable.

Affected Products

  • Apple Mac OS X Server 10.6
  • Apple Mac OS X Server 10.6.1
  • Apple Mac OS X Server 10.6.2
  • Gentoo Linux
  • Mandriva Corporate Server 4.0
  • Mandriva Corporate Server 4.0.0 X86 64
  • Mandriva Enterprise Server 5
  • Mandriva Enterprise Server 5 X86 64
  • Mandriva Linux Mandrake 2008.0
  • Mandriva Linux Mandrake 2008.0 X86 64
  • Mandriva Linux Mandrake 2009.0
  • Mandriva Linux Mandrake 2009.0 X86 64
  • Mandriva Linux Mandrake 2009.1
  • Mandriva Linux Mandrake 2009.1 X86 64
  • Mandriva Linux Mandrake 2010.0
  • Mandriva Linux Mandrake 2010.0 X86 64
  • MySQL AB MySQL 5.0
  • MySQL AB MySQL 5.0.0 .0-0
  • MySQL AB MySQL 5.0.0 .0-Alpha
  • MySQL AB MySQL 5.0.1
  • MySQL AB MySQL 5.0.18
  • MySQL AB MySQL 5.0.19
  • MySQL AB MySQL 5.0.2
  • MySQL AB MySQL 5.0.20
  • MySQL AB MySQL 5.0.21
  • MySQL AB MySQL 5.0.22
  • MySQL AB MySQL 5.0.22 -1-0.1
  • MySQL AB MySQL 5.0.24
  • MySQL AB MySQL 5.0.26
  • MySQL AB MySQL 5.0.27
  • MySQL AB MySQL 5.0.3
  • MySQL AB MySQL 5.0.32
  • MySQL AB MySQL 5.0.33
  • MySQL AB MySQL 5.0.36
  • MySQL AB MySQL 5.0.37
  • MySQL AB MySQL 5.0.38
  • MySQL AB MySQL 5.0.39
  • MySQL AB MySQL 5.0.4
  • MySQL AB MySQL 5.0.40
  • MySQL AB MySQL 5.0.42
  • MySQL AB MySQL 5.0.44
  • MySQL AB MySQL 5.0.45
  • MySQL AB MySQL 5.0.46
  • MySQL AB MySQL 5.0.47
  • MySQL AB MySQL 5.0.48
  • MySQL AB MySQL 5.0.49
  • MySQL AB MySQL 5.0.50
  • MySQL AB MySQL 5.0.51
  • MySQL AB MySQL 5.0.52
  • MySQL AB MySQL 5.0.60
  • MySQL AB MySQL 5.0.66
  • MySQL AB MySQL 5.0.75
  • MySQL AB MySQL 5.1.10
  • MySQL AB MySQL 5.1.11
  • MySQL AB MySQL 5.1.12
  • MySQL AB MySQL 5.1.13
  • MySQL AB MySQL 5.1.14
  • MySQL AB MySQL 5.1.15
  • MySQL AB MySQL 5.1.16
  • MySQL AB MySQL 5.1.17
  • MySQL AB MySQL 5.1.18
  • MySQL AB MySQL 5.1.22
  • MySQL AB MySQL 5.1.23
  • MySQL AB MySQL 5.1.26
  • MySQL AB MySQL 5.1.30
  • MySQL AB MySQL 5.1.31
  • MySQL AB MySQL 5.1.32
  • MySQL AB MySQL 5.1.33
  • MySQL AB MySQL 5.1.34
  • MySQL AB MySQL 5.1.35
  • MySQL AB MySQL 5.1.36
  • MySQL AB MySQL 5.1.37
  • MySQL AB MySQL 5.1.38
  • MySQL AB MySQL 5.1.39
  • MySQL AB MySQL 5.1.5
  • MySQL AB MySQL 5.1.6
  • MySQL AB MySQL 5.1.9
  • MySQL AB MySQL 6.0.0
  • MySQL AB MySQL 6.0.1
  • MySQL AB MySQL 6.0.2
  • MySQL AB MySQL 6.0.3
  • MySQL AB MySQL 6.0.4
  • MySQL AB MySQL 6.0.6
  • MySQL AB MySQL 6.0.7
  • MySQL AB MySQL 6.0.8
  • MySQL AB MySQL 6.0.9
  • Pardus Linux 2009
  • Red Hat Enterprise Linux 5 Server
  • Red Hat Enterprise Linux Desktop 5 Client
  • Red Hat Enterprise Linux Desktop Workstation 5 Client
  • Red Hat Enterprise Linux EUS 5.4.Z Server
  • Red Hat Fedora 10
  • Red Hat Fedora 11
  • Red Hat Fedora 12
  • rPath Appliance Platform Linux Service 1
  • rPath Appliance Platform Linux Service 2
  • rPath rPath Linux 1
  • rPath rPath Linux 2
  • SuSE openSUSE 11.0
  • SuSE openSUSE 11.1
  • SuSE openSUSE 11.2
  • SuSE SUSE Linux Enterprise 10 SP2
  • SuSE SUSE Linux Enterprise 10 SP3
  • SuSE SUSE Linux Enterprise 11
  • Ubuntu Ubuntu Linux 10.04 Amd64
  • Ubuntu Ubuntu Linux 10.04 ARM
  • Ubuntu Ubuntu Linux 10.04 I386
  • Ubuntu Ubuntu Linux 10.04 Powerpc
  • Ubuntu Ubuntu Linux 10.04 Sparc
  • Ubuntu Ubuntu Linux 10.10 amd64
  • Ubuntu Ubuntu Linux 10.10 ARM
  • Ubuntu Ubuntu Linux 10.10 i386
  • Ubuntu Ubuntu Linux 10.10 powerpc
  • Ubuntu Ubuntu Linux 11.04 amd64
  • Ubuntu Ubuntu Linux 11.04 ARM
  • Ubuntu Ubuntu Linux 11.04 i386
  • Ubuntu Ubuntu Linux 11.04 powerpc
  • Ubuntu Ubuntu Linux 11.10 amd64
  • Ubuntu Ubuntu Linux 11.10 i386
  • Ubuntu Ubuntu Linux 6.06 LTS Amd64
  • Ubuntu Ubuntu Linux 6.06 LTS I386
  • Ubuntu Ubuntu Linux 6.06 LTS Powerpc
  • Ubuntu Ubuntu Linux 6.06 LTS Sparc
  • Ubuntu Ubuntu Linux 8.04 LTS Amd64
  • Ubuntu Ubuntu Linux 8.04 LTS I386
  • Ubuntu Ubuntu Linux 8.04 LTS Lpia
  • Ubuntu Ubuntu Linux 8.04 LTS Powerpc
  • Ubuntu Ubuntu Linux 8.04 LTS Sparc
  • Ubuntu Ubuntu Linux 8.10 Amd64
  • Ubuntu Ubuntu Linux 8.10 I386
  • Ubuntu Ubuntu Linux 8.10 Lpia
  • Ubuntu Ubuntu Linux 8.10 Powerpc
  • Ubuntu Ubuntu Linux 8.10 Sparc
  • Ubuntu Ubuntu Linux 9.04 Amd64
  • Ubuntu Ubuntu Linux 9.04 I386
  • Ubuntu Ubuntu Linux 9.04 Lpia
  • Ubuntu Ubuntu Linux 9.04 Powerpc
  • Ubuntu Ubuntu Linux 9.04 Sparc
  • Ubuntu Ubuntu Linux 9.10 Amd64
  • Ubuntu Ubuntu Linux 9.10 I386
  • Ubuntu Ubuntu Linux 9.10 Lpia
  • Ubuntu Ubuntu Linux 9.10 Powerpc
  • Ubuntu Ubuntu Linux 9.10 Sparc

References

  • BugTraq: 37297
  • CVE: CVE-2009-4019

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out