[13340] in bugtraq
mSQL and not MySQL exploit
daemon@ATHENA.MIT.EDU (Tonu Samuel)
Thu Jan 13 17:38:54 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Message-Id: <387DEBC3.B48804AD@mysql.com>
Date: Thu, 13 Jan 2000 10:18:27 -0500
Reply-To: Tonu Samuel <tonu@MYSQL.COM>
From: Tonu Samuel <tonu@MYSQL.COM>
X-To: BUGTRAQ@NETSPACE.ORG, sni@SILENCE.SECNET.COM, fyodor@dhp.com,
mysql_all@mysql.com
To: BUGTRAQ@SECURITYFOCUS.COM
Hi!
Today I discovered the exploit for mSQL:
http://www.insecure.org/sploits/mSQL.overflow.and.hostnamespoof.html
and found little remark in same place: "MySQL is also probably
vulnerable".
MySQL is not vulnerable for this exploit because MySQL doesn't have any
code from mSQL. This can be confusing excerpt in out manual:
"We once started off with the intention of using mSQL to connect to our
tables using our own fast low-level (ISAM) routines. However, after some
testing we came to the
conclusion that mSQL was not fast enough or flexible enough for our
needs. This resulted in a new SQL interface to our database but with
almost the same API interface
as mSQL. This API was chosen to ease porting of third-party code. "
But this means we used MySQL uses mSQL-like API but not code.
--
+----------------------------------------------------------------+
| TcX ____ __ _____ _____ ___ |
| /*/\*\/\*\ /*/ \*\ /*/ \*\ |*| Tunu Samuel |
| /*/ /*/ /*/ \*\_ |*| |*||*| tonu@mysql.com |
| /*/ /*/ /*/\*\/*/ \*\|*| |*||*| Tallinn, Estonia |
| /*/ /*/ /*/\*\_/*/ \*\_/*/ |*|____ |
| ^^^^^^^^^^^^/*/^^^^^^^^^^^\*\^^^^^^^^^^^ |
| /*/ \*\ Developers Team |
+----------------------------------------------------------------+