This service will be undergoing maintenance at 20:00 UTC, 2017-04-03. It is expected to last about 30 minutes
Bug 254108 - (CVE-2007-3780) CVE-2007-3780 mysql malformed password crasher
CVE-2007-3780 mysql malformed password crasher
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Tom Lane
: Security
Depends On: 257581 257601 257621 257641 257661 257681 282471 372881
  Show dependency treegraph
Reported: 2007-08-24 03:19 EDT by Issue Tracker
Modified: 2013-07-02 23:14 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-01-16 09:07:48 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Comment 3 Issue Tracker 2007-08-24 03:19:12 EDT
in libmysqld/ and sql/, line 2006 , in 
check_connection(THD *thd), the cast propose in the patch is not done.

    *passwd++ : strlen(passwd);

Issue escalated to Support Engineering Group by: pamadio.
Internal Status set to 'Waiting on SEG'

This event sent from IssueTracker by jnansi  [Support Engineering Group]
 issue 128191
Comment 4 Issue Tracker 2007-08-24 03:19:14 EDT

More information about mysql bug 28984 is available here:

It looks to me like the needed modification is not applyed in our version
of the check_connection(THD *thd) function, so i have escalated this

I'll contact you back when i have more news about this issue.

Best regards.

This event sent from IssueTracker by jnansi  [Support Engineering Group]
 issue 128191
Comment 14 Red Hat Product Security 2008-01-16 09:07:48 EST
This issue was addressed in:

Red Hat Application Stack:

Red Hat Enterprise Linux:

  updated to fixed upstream version

Note You need to log in before you can comment on or make changes to this bug.