Lucene search

K
amazonAmazonALAS-2017-926
HistoryDec 05, 2017 - 9:50 p.m.

Important: mysql56, mysql57

2017-12-0521:50:00
alas.aws.amazon.com
22

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

74.5%

Issue Overview:

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. (CVE-2017-10379)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. (CVE-2017-10378)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. (CVE-2017-10283)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. (CVE-2017-10227)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.(CVE-2017-10294)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. (CVE-2017-10268)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.(CVE-2017-10155)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.(CVE-2017-10314)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.(CVE-2017-10384)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS). Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. (CVE-2017-10276)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.(CVE-2017-10286)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.(CVE-2017-10279)

Affected Packages:

mysql56, mysql57

Issue Correction:
Run yum update mysql56 to update your system.
Run yum update mysql57 to update your system.

New Packages:

i686:  
    mysql56-embedded-5.6.38-1.27.amzn1.i686  
    mysql56-embedded-devel-5.6.38-1.27.amzn1.i686  
    mysql56-bench-5.6.38-1.27.amzn1.i686  
    mysql56-server-5.6.38-1.27.amzn1.i686  
    mysql56-errmsg-5.6.38-1.27.amzn1.i686  
    mysql56-libs-5.6.38-1.27.amzn1.i686  
    mysql56-debuginfo-5.6.38-1.27.amzn1.i686  
    mysql56-common-5.6.38-1.27.amzn1.i686  
    mysql56-devel-5.6.38-1.27.amzn1.i686  
    mysql56-test-5.6.38-1.27.amzn1.i686  
    mysql56-5.6.38-1.27.amzn1.i686  
    mysql57-debuginfo-5.7.20-2.5.amzn1.i686  
    mysql57-errmsg-5.7.20-2.5.amzn1.i686  
    mysql57-embedded-5.7.20-2.5.amzn1.i686  
    mysql57-server-5.7.20-2.5.amzn1.i686  
    mysql57-devel-5.7.20-2.5.amzn1.i686  
    mysql57-libs-5.7.20-2.5.amzn1.i686  
    mysql57-test-5.7.20-2.5.amzn1.i686  
    mysql57-embedded-devel-5.7.20-2.5.amzn1.i686  
    mysql57-5.7.20-2.5.amzn1.i686  
    mysql57-common-5.7.20-2.5.amzn1.i686  
  
src:  
    mysql56-5.6.38-1.27.amzn1.src  
    mysql57-5.7.20-2.5.amzn1.src  
  
x86_64:  
    mysql56-bench-5.6.38-1.27.amzn1.x86_64  
    mysql56-devel-5.6.38-1.27.amzn1.x86_64  
    mysql56-embedded-5.6.38-1.27.amzn1.x86_64  
    mysql56-libs-5.6.38-1.27.amzn1.x86_64  
    mysql56-embedded-devel-5.6.38-1.27.amzn1.x86_64  
    mysql56-errmsg-5.6.38-1.27.amzn1.x86_64  
    mysql56-test-5.6.38-1.27.amzn1.x86_64  
    mysql56-server-5.6.38-1.27.amzn1.x86_64  
    mysql56-common-5.6.38-1.27.amzn1.x86_64  
    mysql56-5.6.38-1.27.amzn1.x86_64  
    mysql56-debuginfo-5.6.38-1.27.amzn1.x86_64  
    mysql57-common-5.7.20-2.5.amzn1.x86_64  
    mysql57-libs-5.7.20-2.5.amzn1.x86_64  
    mysql57-server-5.7.20-2.5.amzn1.x86_64  
    mysql57-embedded-5.7.20-2.5.amzn1.x86_64  
    mysql57-devel-5.7.20-2.5.amzn1.x86_64  
    mysql57-debuginfo-5.7.20-2.5.amzn1.x86_64  
    mysql57-embedded-devel-5.7.20-2.5.amzn1.x86_64  
    mysql57-test-5.7.20-2.5.amzn1.x86_64  
    mysql57-5.7.20-2.5.amzn1.x86_64  
    mysql57-errmsg-5.7.20-2.5.amzn1.x86_64  

Additional References

Red Hat: CVE-2017-10155, CVE-2017-10227, CVE-2017-10268, CVE-2017-10276, CVE-2017-10279, CVE-2017-10283, CVE-2017-10286, CVE-2017-10294, CVE-2017-10314, CVE-2017-10378, CVE-2017-10379, CVE-2017-10384

Mitre: CVE-2017-10155, CVE-2017-10227, CVE-2017-10268, CVE-2017-10276, CVE-2017-10279, CVE-2017-10283, CVE-2017-10286, CVE-2017-10294, CVE-2017-10314, CVE-2017-10378, CVE-2017-10379, CVE-2017-10384

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

74.5%