{"id":"CVE-2015-8949","details":"Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login.","modified":"2026-01-27T04:14:04.445598Z","published":"2016-08-19T21:59:02Z","withdrawn":"2026-01-27T04:14:04.445598Z","related":["MGASA-2016-0300"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3635"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/07/25/13"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/07/27/1"},{"type":"ADVISORY","url":"https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html"},{"type":"ADVISORY","url":"https://github.com/perl5-dbi/DBD-mysql/blob/4.033_01/Changes"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-51"},{"type":"REPORT","url":"https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156"},{"type":"REPORT","url":"https://github.com/perl5-dbi/DBD-mysql/pull/45"},{"type":"WEB","url":"http://www.securityfocus.com/bid/92118"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}