[13340] in bugtraq

home help back first fref pref prev next nref lref last post

mSQL and not MySQL exploit

daemon@ATHENA.MIT.EDU (Tonu Samuel)
Thu Jan 13 17:38:54 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Message-Id:  <387DEBC3.B48804AD@mysql.com>
Date:         Thu, 13 Jan 2000 10:18:27 -0500
Reply-To: Tonu Samuel <tonu@MYSQL.COM>
From: Tonu Samuel <tonu@MYSQL.COM>
X-To:         BUGTRAQ@NETSPACE.ORG, sni@SILENCE.SECNET.COM, fyodor@dhp.com,
              mysql_all@mysql.com
To: BUGTRAQ@SECURITYFOCUS.COM

Hi!

Today I discovered the exploit for mSQL:
http://www.insecure.org/sploits/mSQL.overflow.and.hostnamespoof.html
and found little remark in same place: "MySQL is also probably
vulnerable".

MySQL is not vulnerable for this exploit because MySQL doesn't have any
code from mSQL. This can be confusing excerpt in out manual:

"We once started off with the intention of using mSQL to connect to our
tables using our own fast low-level (ISAM) routines. However, after some
testing we came to the
conclusion that mSQL was not fast enough or flexible enough for our
needs. This resulted in a new SQL interface to our database but with
almost the same API interface
as mSQL. This API was chosen to ease porting of third-party code. "

But this means we used MySQL uses mSQL-like API but not code.

--
+----------------------------------------------------------------+
| TcX  ____  __     _____   _____  ___                           |
|     /*/\*\/\*\   /*/ \*\ /*/ \*\ |*|     Tunu Samuel           |
|    /*/ /*/ /*/   \*\_   |*|   |*||*|     tonu@mysql.com        |
|   /*/ /*/ /*/\*\/*/  \*\|*|   |*||*|     Tallinn, Estonia      |
|  /*/     /*/  /*/\*\_/*/ \*\_/*/ |*|____                       |
|  ^^^^^^^^^^^^/*/^^^^^^^^^^^\*\^^^^^^^^^^^                      |
|             /*/             \*\                Developers Team |
+----------------------------------------------------------------+

home help back first fref pref prev next nref lref last post