The DBD::mysql module before 4.039 for Perl, when using server-side prepared statement support, allows attackers to cause a denial of service (out-of-bounds read) via vectors involving an unaligned number of placeholders in WHERE condition and output fields in SELECT expression.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/11/16/1 | mailing list patch mitigation third party advisory |
https://github.com/perl5-dbi/DBD-mysql/commit/793b72b1a0baa5070adacaac0e12fd995a6fbabe | third party advisory patch |
http://www.securityfocus.com/bid/94350 | vdb entry third party advisory |
http://cpansearch.perl.org/src/CAPTTOFU/DBD-mysql-4.039/Changes | release notes vendor advisory |
https://security.gentoo.org/glsa/201701-51 | vendor advisory |