Madrid, May 5, 2006 - Several vulnerabilities have been reported in the
MySQL database manager, which could be exploited by attackers to
compromise a vulnerable system or obtain sensitive information.
The first flaw is caused by a buffer overflow in script "sql_base.cc",
which cannot handle specially crafted "COM_TABLE_DUMP" packets properly.
This could be exploited by authenticated attackers to run arbitrary
The second vulnerability stems from an input validation error in file
"sql_parse.cc", which fails to validate "COM_TABLE_DUMP" packets. This
could be exploited by an attacker to have portions of memory disclosed
in error messages.
Finally, the third vulnerability, which could also lead to portions of
the memory to be disclosed in error messages, is due to an input
validation error in script "sql_parse.cc" which cannot handle malformed
login packets properly.
Affected users are advised to upgrade their products to MySQL version
5.0.21, available at http://dev.mysql.com/downloads/. The original
security advisory can be found at
Kerio WinRoute Firewall Protocol Inspection Denial of Service
SECUNIA ADVISORY ID:
Kerio WinRoute Firewall 6.x
A vulnerability has been reported in Kerio WinRoute Firewall, which
can be exploited by malicious people to cause a DoS (Denial of
The vulnerability is caused due to an unspecified error in the SMTP
and POP3 protocol inspectors. This can be exploited to crash the
service when a malformed e-mail is sent via SMTP or received via
The vulnerability has been reported in versions prior to 6.2.1.
Update to version 6.2.1 or later.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.