Bug #37915 | COM_STMT_EXECUTE can be trickted into reading invalid memory | ||
---|---|---|---|
Submitted: | 7 Jul 2008 7:58 | Modified: | 7 Jul 2008 20:22 |
Reporter: | Jan Kneschke | Email Updates: | |
Status: | Not a Bug | Impact on me: | |
Category: | MySQL Server | Severity: | S3 (Non-critical) |
Version: | 5.0.51b | OS: | Any |
Assigned to: | CPU Architecture: | Any |
[7 Jul 2008 7:58]
Jan Kneschke
[7 Jul 2008 20:22]
Konstantin Osipov
This is intentional. We always know that the packet is bigger and are saving on one if. I know it sounds insane, but this is how this code was written, i verified it works, and have no intention to change what's not broken -- in many other places in the server we do the same when parse the input packet.
[8 Jul 2008 12:31]
Jan Kneschke
The "suggested fix" section is containing the "buggy code section". The real suggested fix is: * check the length before using the data and * return a error-packet or close the connection