Red Hat Bugzilla – Bug 852144
CVE-2012-4414 mysql: Multiple SQL injection flaws by generation of binlog entries
Last modified: 2018-06-29 17:59:16 EDT
Multiple SQL injection flaws were found in the way the binlog functionality (routines producing events describing database changes such as table creation operations or changes to table data) of MySQL, a multi-user, multi-threaded SQL database server, performed sanitization of table names and other fields prior creating particular log entry. Authorised database users (with privilege to modify tables) could use this flaw to inject arbitrary SQL query into subsequently generated binlog entries. References: [1] https://mariadb.atlassian.net/browse/MDEV-382 MariaDB patches: [2] http://bazaar.launchpad.net/~maria-captains/maria/5.1/revision/3151.1.1 (against 5.1 branch) [3] http://bazaar.launchpad.net/~maria-captains/maria/5.2/revision/3163.1.1 (against 5.2 branch) [4] http://bazaar.launchpad.net/~maria-captains/maria/5.3/revision/3556.1.2 (against 5.3 branch) [5] http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/3508 (against 5.5 branch) MySQL bug: [6] http://bugs.mysql.com/66550
*** Bug 855539 has been marked as a duplicate of this bug. ***
A MySQL bug entry is available for this issue: http://bugs.mysql.com/bug.php?id=66550
Public via http://www.openwall.com/lists/oss-security/2012/09/11/4
Created mysql tracking bugs for this issue Affects: fedora-all [bug 863320]
Following blog post suggests that the fix for this issue is included in upstream MySQL 5.5.29, but it does not completely and correctly resolve the issue: http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/
Statement: This issue affects the version of mysql packages shipped in Red Hat Enterprise Linux 5 and 6, the version of mysql55-mysql packages shipped in Red Hat Enterprise Linux 5 and the version of mariadb as shipped in Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Moderate security impact and are currently waiting for upstream to fix this issue.