An Attack on MySQL's Login Protocol

An Attack on MySQL's Login Protocol

The MySQL challenge and response authentication protocol is proven insecure. Sensitive information is shown to be leaked during each execution of this protocol. We present an algorithm exploiting this vulnerability that enables a passive attacker to impersonate a valid user after witnessing a small number of protocol executions. The paper concludes with statistical information and some efficiency and effectiveness estimates.

Note: This vulnerability is described by CVE-2000-0981

Related information

Protocol design flaws

Wednesday, January 31, 2001