Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - MySQL: Man-in-the-Middle of TLS

June 2015 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

An attacker can act as a Man-in-the-Middle when the MySQL client
asks for a TLS session, in order to read or alter exchanged data.

 Impacted products: MySQL Community, MySQL Enterprise, Percona
Server, XtraDB Cluster
 Severity: 2/4
 Creation date: 29/04/2015

DESCRIPTION OF THE VULNERABILITY

The MySQL client can communicate with the server through a TLS
session.

The "—ssl" option of the client tries to setup a TLS session, but
does not require it. This behavior is documented, however many
administrators are not aware of this behavior.

An attacker can therefore act as a Man-in-the-Middle when the
MySQL client asks for a TLS session, in order to read or alter
exchanged data.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/MySQL-Man-in-the-Middle-of-TLS-16761


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts