Lucene search

K
amazonAmazonALAS-2018-1116
HistoryDec 06, 2018 - 12:40 a.m.

Medium: mysql55

2018-12-0600:40:00
alas.aws.amazon.com
102

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.1%

Issue Overview:

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).(CVE-2018-3174)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2018-3133)

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.(CVE-2016-9843)

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2018-3282)

Affected Packages:

mysql55

Issue Correction:
Run yum update mysql55 to update your system.

New Packages:

i686:  
    mysql55-embedded-5.5.62-1.23.amzn1.i686  
    mysql55-devel-5.5.62-1.23.amzn1.i686  
    mysql55-bench-5.5.62-1.23.amzn1.i686  
    mysql-config-5.5.62-1.23.amzn1.i686  
    mysql55-debuginfo-5.5.62-1.23.amzn1.i686  
    mysql55-server-5.5.62-1.23.amzn1.i686  
    mysql55-test-5.5.62-1.23.amzn1.i686  
    mysql55-libs-5.5.62-1.23.amzn1.i686  
    mysql55-5.5.62-1.23.amzn1.i686  
    mysql55-embedded-devel-5.5.62-1.23.amzn1.i686  
  
src:  
    mysql55-5.5.62-1.23.amzn1.src  
  
x86_64:  
    mysql55-5.5.62-1.23.amzn1.x86_64  
    mysql55-bench-5.5.62-1.23.amzn1.x86_64  
    mysql55-devel-5.5.62-1.23.amzn1.x86_64  
    mysql55-embedded-devel-5.5.62-1.23.amzn1.x86_64  
    mysql55-embedded-5.5.62-1.23.amzn1.x86_64  
    mysql55-test-5.5.62-1.23.amzn1.x86_64  
    mysql55-debuginfo-5.5.62-1.23.amzn1.x86_64  
    mysql-config-5.5.62-1.23.amzn1.x86_64  
    mysql55-server-5.5.62-1.23.amzn1.x86_64  
    mysql55-libs-5.5.62-1.23.amzn1.x86_64  

Additional References

Red Hat: CVE-2016-9843, CVE-2018-3133, CVE-2018-3174, CVE-2018-3282

Mitre: CVE-2016-9843, CVE-2018-3133, CVE-2018-3174, CVE-2018-3282

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.1%