mysql| Security | program | data | database
MySQL has released a security update to fix errors in its client-server protocol that could allow a malicious attacker to exploit a buffer overflow vulnerability to obtain sensitive information.
The Open-source company released its MySQL 5.0.21 version of the update earlier this week. This update is to address security vulnerabilities in the 5.1.9, 5.0.20, 4.1.18, 4.0.26 versions, and previous version of the database server software.
Security research company FrSIRT these errors into a "moderate" level of risk. The MySQL 5.0 version, released late last year, was considered to be widely used.
FrSIRT that one of the three security vulnerabilities involved a buffer overflow error that could be used by an attacker to execute arbitrary commands on the user's system.
The other two vulnerabilities were exploited when input information was validated incorrectly. These vulnerabilities allow an attacker to obtain part of the system's memory (information) from the error message.