Unrated severityNVD Advisory· Published May 5, 2006· Updated Apr 16, 2026
CVE-2006-1516
CVE-2006-1516
Description
The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
Affected products
71cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*+ 16 more
- cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*+ 53 more
- cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
42- dev.mysql.com/doc/refman/5.0/en/news-5-0-21.htmlnvdPatch
- secunia.com/advisories/19929nvdPatchVendor Advisory
- securitytracker.com/idnvdPatch
- www.wisec.it/vulns.phpnvdPatch
- www.us-cert.gov/cas/techalerts/TA07-072A.htmlnvdUS Government Resource
- bugs.debian.org/365938nvd
- docs.info.apple.com/article.htmlnvd
- lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlnvd
- lists.suse.com/archive/suse-security-announce/2006-Jun/0011.htmlnvd
- secunia.com/advisories/20002nvd
- secunia.com/advisories/20073nvd
- secunia.com/advisories/20076nvd
- secunia.com/advisories/20223nvd
- secunia.com/advisories/20241nvd
- secunia.com/advisories/20253nvd
- secunia.com/advisories/20333nvd
- secunia.com/advisories/20424nvd
- secunia.com/advisories/20457nvd
- secunia.com/advisories/20625nvd
- secunia.com/advisories/20762nvd
- secunia.com/advisories/24479nvd
- secunia.com/advisories/29847nvd
- securityreason.com/securityalert/840nvd
- slackware.com/security/viewer.phpnvd
- sunsolve.sun.com/search/document.donvd
- www.debian.org/security/2006/dsa-1071nvd
- www.debian.org/security/2006/dsa-1073nvd
- www.debian.org/security/2006/dsa-1079nvd
- www.gentoo.org/security/en/glsa/glsa-200605-13.xmlnvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2006-06-02.htmlnvd
- www.redhat.com/support/errata/RHSA-2006-0544.htmlnvd
- www.securityfocus.com/archive/1/432733/100/0/threadednvd
- www.securityfocus.com/archive/1/434164/100/0/threadednvd
- www.securityfocus.com/bid/17780nvd
- www.trustix.org/errata/2006/0028nvd
- www.vupen.com/english/advisories/2006/1633nvd
- www.vupen.com/english/advisories/2007/0930nvd
- www.vupen.com/english/advisories/2008/1326/referencesnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26236nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918nvd
- usn.ubuntu.com/283-1/nvd
News mentions
0No linked articles in our index yet.