lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201701182118.v0ILIdj2000517@sf01web3.securityfocus.com> Date: Wed, 18 Jan 2017 21:18:39 GMT From: lem.nikolas@...il.com To: bugtraq@...urityfocus.com Subject: Novel Contributions to the Field - How I broke MySQL's codebase (Part 2) [CVE-2016-5541] MySQL Cluster 0day ************************************************** (c) 2017 Advanced Information Security Corporation and Oracle Inc. ************************************************** Author: Nicholas Lemonias Date: 17/01/2017 MySQL Remote 0day / Remote Buffer Overflows in 'NDBAPI' Cluster Full report with technical details can be obtained from: https://www.docdroid.net/hwLnQVr/cve-2016-5541.pdf.html (References) [1] Oracle Critical Patch Update - January 2017. 2017. Oracle Critical Patch Update - January 2017. [ONLINE] Available at: http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html