| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.5 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Sun MySQL 3/4 on Windows. It has been declared as problematic. This affects an unknown part of the file my.ini. Executing a manipulation can lead to missing encryption. The identification of this vulnerability is CVE-2001-1255. The attack needs to be done within the local network. Furthermore, there is an exploit available. Adding more encryption is recommended.
Details
A vulnerability classified as critical was found in Sun MySQL 3/4 on Windows (Database Software). This vulnerability affects some unknown processing of the file my.ini. The manipulation with an unknown input leads to a missing encryption vulnerability. The CWE definition for the vulnerability is CWE-311. The product does not encrypt sensitive or critical information before storage or transmission. As an impact it is known to affect confidentiality, and integrity. CVE summarizes:
WinMySQLadmin 1.1 stores the MySQL password in plain text in the my.ini file, which allows local users to obtain unathorized access the MySQL database.
The bug was discovered 10/02/2001. The weakness was shared 08/20/2003 by Lorenzo Hernandez Garcia-Hierro with isec (Website). The advisory is shared for download at secunia.com. This vulnerability was named CVE-2001-1255. Access to the local network is required for this attack to succeed. No form of authentication is required for a successful exploitation. Technical details and also a public exploit are known. The MITRE ATT&CK project declares the attack technique as T1600.
It is possible to download the exploit at secunia.com. It is declared as proof-of-concept. As 0-day the estimated underground price was around $5k-$25k. By approaching the search of inurl:my.ini it is possible to find vulnerable targets with Google Hacking.
Upgrading to version 1.1 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at mysql.com. The best possible mitigation is suggested to be adding encryption. Attack attempts may be identified with Snort ID 1776.
The vulnerability is also documented in the databases at X-Force (7206), SecurityFocus (BID 3381†), OSVDB (2144†) and Secunia (SA9565†). Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Support
- end of life (old version)
Website
- Vendor: https://www.oracle.com/sun/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.1VulDB Meta Temp Score: 6.5
VulDB Base Score: 7.1
VulDB Temp Score: 6.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Missing encryptionCWE: CWE-311 / CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: EncryptionStatus: 🔍
0-Day Time: 🔍
Upgrade: MySQL 1.1
Patch: mysql.com
Snort ID: 1776
Timeline
10/02/2001 🔍10/02/2001 🔍
10/02/2001 🔍
08/19/2003 🔍
08/20/2003 🔍
08/20/2003 🔍
06/07/2017 🔍
Sources
Vendor: oracle.comAdvisory: secunia.com⛔
Researcher: Lorenzo Hernandez Garcia-Hierro
Organization: isec
Status: Not defined
CVE: CVE-2001-1255 (🔍)
GCVE (CVE): GCVE-0-2001-1255
GCVE (VulDB): GCVE-100-244
X-Force: 7206
SecurityFocus: 3381 - WinMySQLadmin Plain Text Password Storage Vulnerability
Secunia: 9565 - MySQL Win32 Exposes Admin Password, Less Critical
OSVDB: 2144 - WinMySQLadmin my.ini Cleartext Password Disclosure
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 08/20/2003 12:07Updated: 06/07/2017 16:01
Changes: 08/20/2003 12:07 (75), 06/07/2017 16:01 (3)
Complete: 🔍
Cache ID: 216:FE8:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.