MySQL https://news.hitb.org/ en MySQL mistake is a wake-up call on open source ownership https://news.hitb.org/content/mysql-mistake-wake-call-open-source-ownership <article data-history-node-id="47575" role="article" class="node article teaser clearfix UTF-8"> <header> <h2 class="title text-center"><a href="/content/mysql-mistake-wake-call-open-source-ownership" rel="bookmark"><span>MySQL mistake is a wake-up call on open source ownership</span> </a></h2> <div class="meta submit clearfix"> <div class="date text-right"> <span class="lowercase">posted on</span>June 24, 2013 </div> <div class="author"> <span class="lowercase">by</span> <span><span>l33tdawg</span></span> </div> </div> </header> <div class="image-default"> <div> <a href="/content/mysql-mistake-wake-call-open-source-ownership" hreflang="en"><img loading="lazy" src="/sites/default/files/styles/medium/public/field/image/500px-MySQL.svg_.png?itok=t49xl_0g" width="220" height="114" alt="http://en.wikipedia.org/wiki/MySQL" title="Credit: Wikipedia" /> </a> </div> <div class="image-credit"> <strong>Credit:</strong> <a href="http://en.wikipedia.org/wiki/MySQL" target="_blank">http://en.wikipedia.org/wiki/MySQL</a> </div> </div> <div class="content"> <div><p>There was a moment of panic in the open source community this week when a developer on the MariaDB fork of MySQL discovered that Oracle had quietly changed the license on all the man pages for MySQL from GPL to a restrictive proprietary license two months earlier. Prompted by the bug report, Oracle's staff quickly discovered that an error had been made in the build system and promised to immediately undo the change and restore the GPL to all of MySQL. Problem solved!</p></div> </div> <div class="meta link clearfix"> <div class="comment"> <span class="lowercase">no</span>comment </div> <div class="share text-center show-for-medium"> <span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/mysql-mistake-wake-call-open-source-ownership" data-a2a-title="MySQL mistake is a wake-up call on open source ownership"><a class="a2a_button_facebook"><span class="fa fa-facebook"></span></a><a class="a2a_button_twitter"><span class="fa fa-twitter"></span></a><a class="a2a_button_linkedin"><span class="fa fa-linkedin"></span></a><a class="a2a_button_email"><span class="fa fa-envelope"></span></a></span> </div> <div class="read-more"><a href="/content/mysql-mistake-wake-call-open-source-ownership"><span class="lowercase">&#8594;</span>READ MORE</a></div> </div> </article> Mon, 24 Jun 2013 01:48:47 +0000 l33tdawg 47575 at https://news.hitb.org Serious MySQL authentication bypass vulnerability found - Metasploit module already released https://news.hitb.org/content/serious-mysql-authentication-bypass-vulnerability-found <article data-history-node-id="44696" role="article" class="node article teaser clearfix UTF-8"> <header> <h2 class="title text-center"><a href="/content/serious-mysql-authentication-bypass-vulnerability-found" rel="bookmark"><span>Serious MySQL authentication bypass vulnerability found - Metasploit module already released</span> </a></h2> <div class="meta submit clearfix"> <div class="date text-right"> <span class="lowercase">posted on</span>June 11, 2012 </div> <div class="author"> <span class="lowercase">by</span> <span><span>l33tdawg</span></span> </div> </div> </header> <div class="image-default"> <div> <a href="/content/serious-mysql-authentication-bypass-vulnerability-found" hreflang="en"><img loading="lazy" src="/sites/default/files/styles/medium/public/field/image/mysql_hacked.png?itok=9Y3E--o3" width="220" height="99" alt="http://4.bp.blogspot.com/-M6SEU5Vpq4g/T9Wcjvbn2pI/AAAAAAAAGkY/yTR8PCNq_is/s640/mysql_hacked.png" title="Credit: The Hacker News " /> </a> </div> <div class="image-credit"> <strong>Credit:</strong> <a href="http://4.bp.blogspot.com/-M6SEU5Vpq4g/T9Wcjvbn2pI/AAAAAAAAGkY/yTR8PCNq_is/s640/mysql_hacked.png" target="_blank">http://4.bp.blogspot.com/-M6SEU5Vpq4g/T9Wcjvbn2pI/AAAAAAAAGkY/yTR8PCNq_is/s640/mysql_hacked.png</a> </div> </div> <div class="content"> <div><p>A serious security bug in MariaDB and MySQL Disclosed, According to Advisory All MariaDB and MySQL versions up to 5.1.61, 5.2.11, 5.3.5, 5.5.22 are vulnerable. This issue got assigned an id CVE-2012-2122. </p> <p>Mysql_hashdump module from Metasploit uses a known username and password to access the master user table of a MySQL server and dump it into a locally-stored "loot" file. This can be easily cracked using a tool like John the Ripper, providing clear-text passwords that may provide further access.</p></div> </div> <div class="meta link clearfix"> <div class="comment"> <span class="lowercase">no</span>comment </div> <div class="share text-center show-for-medium"> <span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/serious-mysql-authentication-bypass-vulnerability-found" data-a2a-title="Serious MySQL authentication bypass vulnerability found - Metasploit module already released"><a class="a2a_button_facebook"><span class="fa fa-facebook"></span></a><a class="a2a_button_twitter"><span class="fa fa-twitter"></span></a><a class="a2a_button_linkedin"><span class="fa fa-linkedin"></span></a><a class="a2a_button_email"><span class="fa fa-envelope"></span></a></span> </div> <div class="read-more"><a href="/content/serious-mysql-authentication-bypass-vulnerability-found"><span class="lowercase">&#8594;</span>READ MORE</a></div> </div> </article> Mon, 11 Jun 2012 08:39:56 +0000 l33tdawg 44696 at https://news.hitb.org