An Attack on MySQL's Login Protocol

An Attack on MySQL's Login Protocol

Wednesday, January 31, 2001
Iván Arce, Agustín Azubel, Emiliano Kargieman, Gerardo Richarte, Carlos Sarraute and Ariel Waissbein
CoreLabs Technical Report (arXiv:1006.2411)

The MySQL challenge and response authentication protocol is proven insecure. Sensitive information is shown to be leaked during each execution of this protocol. We present an algorithm exploiting this vulnerability that enables a passive attacker to impersonate a valid user after witnessing a small number of protocol executions. The paper concludes with statistical information and some efficiency and effectiveness estimates.

Note: This vulnerability is described by CVE-2000-0981

Related information

Protocol design flaws