Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 9 Feb 2012 21:01:31 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: Re: MySQL 0-day - does it need a CVE?

On Thu, Feb 09, 2012 at 10:20:14AM -0700, Kurt Seifried wrote:
> https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi,
> 
> We are releasing a working MySQL 5.5.20 remote 0day exploit with this
> update.The exploit has been tested with mysql-5.5.20-debian6.0-i686.deb
> on Debian 6.0.
> 
> Best,
> Intevydis Ltd.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (Darwin)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
> 
> iEYEARECAAYFAk8xdTEACgkQY8Flb3OI+Q2zXwCfQL5y+R8n+ipdMYIRdoVPkEdF
> yeoAn26p3KmY0+WYFqKrb9/A3frNo2Xm
> =m+1k
> -----END PGP SIGNATURE-----
> 
> Does this need a CVE # or have you already gotten one from Mitre?
> 
> -- 
> Kurt Seifried Red Hat Security Response Team (SRT)

No idea. I don't see this in MITRE's CVE-list yet and it seems that some information is going around Internet, but nobody is telling exact facts.

- Henri Salo

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.