vendor:
MySQL
by:
Rodrigo Marcos
7.5
CVSS
HIGH
Integer Overflow
119
CWE
Product Name: MySQL
Affected Version From: 5.6.35
Affected Version To: 5.6.35 and below / 5.7.17 and below
Patch Exists: YES
Related CWE: CVE-2017-3599
CPE: mysql
Metasploit:
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2017-3599/, https://www.rapid7.com/db/vulnerabilities/oracle-mysql-cve-2017-3599/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2017-3599/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2017-3599/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-3599/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2017-3599/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2017-3599/
Platforms Tested:
2017
Remote MySQL DOS (Integer Overflow)
This is a proof of concept exploit code for CVE-2017-3599, a vulnerability in MySQL that allows for a remote denial of service attack. The exploit code creates a packet with specific values that trigger the vulnerability and crash the MySQL server. The vulnerability occurs when the server receives a login request packet with a length value that exceeds the maximum allowed value, resulting in an integer overflow. By sending a specially crafted packet, an attacker can cause the server to crash, denying access to legitimate users.
Mitigation:
Upgrade to a patched version of MySQL that addresses the vulnerability. As of the publication of this exploit, the vendor has released patches for versions 5.6.36 and 5.7.18. It is recommended to always keep the software up to date to mitigate the risk of this and other vulnerabilities.