The MySQL challenge and response authentication protocol is proven insecure. Sensitive information is shown to be leaked during each execution of this protocol. We present an algorithm exploiting this vulnerability that enables a passive attacker to impersonate a valid user after witnessing a small number of protocol executions. The paper concludes with statistical information and some efficiency and effectiveness estimates.
Note: This vulnerability is described by CVE-2000-0981
Protocol design flaws