MySQL have some vulnerabilities, which can be exploited by
malicious users to disclose potentially sensitive information
and compromise a vulnerable system.
1) An error within the code that generates an error response
to an invalid COM_TABLE_DUMP packet can be exploited by an
authenticated client to disclosure certain memory content of the
server process.
2) A boundary error within the handling of specially crafted
invalid COM_TABLE_DUMP packets can be exploited by an authenticated
client to cause a buffer overflow and allows arbitrary code
execution.
3) An error within the handling of malformed login packets can be
exploited to disclosure certain memory content of the server
process in the error messages.