Thread-topic: [SA20365] MySQL Multibyte Encoding SQL Injection Vulnerability
> TITLE:
> MySQL Multibyte Encoding SQL Injection Vulnerability
>
> SECUNIA ADVISORY ID:
> SA20365
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> Manipulation of data
>
> WHERE:
> From remote
>
> SOFTWARE:
> MySQL 5.x
>
> MySQL 4.x
>
>
> DESCRIPTION:
> A vulnerability has been reported in MySQL, which potentially can be
> exploited by malicious people to conduct SQL injection attacks.
>
> The vulnerability is caused due to an error within the server when
> parsing a query string that is escaped with the
> "mysql_real_escape_string()" function. This can potentially be
> exploited in an environment that uses multi-byte character encoding
> to bypass SQL injection escaping.
>
> The vulnerability is related to:
> SA20231
>
> The vulnerability has been reported in version 4.1.19 and 5.0.21.
> Prior versions may also be affected.
>
> SOLUTION:
> Update to the fixed versions.
>
> MySQL 4.1.x:
> Update to version 4.1.20.
>
>
> MySQL 5.0.x:
> Update to version 5.0.22.
>
>
> MySQL 5.1.x:
> The vulnerability will be fixed in version 5.1.11.
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits Josh Berkus and Tom Lane.
>
> ORIGINAL ADVISORY:
> MySQL:
>
>
>
>
>
>
>
> OTHER REFERENCES:
> SA20231:
>
>