6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
0.003 Low
EPSS
Percentile
65.6%
Issue Overview:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Information Schema). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).(CVE-2019-2911)
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2019-2974)
Affected Packages:
mysql56
Issue Correction:
Run yum update mysql56 to update your system.
New Packages:
i686:
mysql56-embedded-devel-5.6.46-1.35.amzn1.i686
mysql56-test-5.6.46-1.35.amzn1.i686
mysql56-5.6.46-1.35.amzn1.i686
mysql56-bench-5.6.46-1.35.amzn1.i686
mysql56-devel-5.6.46-1.35.amzn1.i686
mysql56-common-5.6.46-1.35.amzn1.i686
mysql56-server-5.6.46-1.35.amzn1.i686
mysql56-embedded-5.6.46-1.35.amzn1.i686
mysql56-libs-5.6.46-1.35.amzn1.i686
mysql56-errmsg-5.6.46-1.35.amzn1.i686
mysql56-debuginfo-5.6.46-1.35.amzn1.i686
src:
mysql56-5.6.46-1.35.amzn1.src
x86_64:
mysql56-5.6.46-1.35.amzn1.x86_64
mysql56-errmsg-5.6.46-1.35.amzn1.x86_64
mysql56-debuginfo-5.6.46-1.35.amzn1.x86_64
mysql56-test-5.6.46-1.35.amzn1.x86_64
mysql56-common-5.6.46-1.35.amzn1.x86_64
mysql56-server-5.6.46-1.35.amzn1.x86_64
mysql56-libs-5.6.46-1.35.amzn1.x86_64
mysql56-embedded-5.6.46-1.35.amzn1.x86_64
mysql56-embedded-devel-5.6.46-1.35.amzn1.x86_64
mysql56-devel-5.6.46-1.35.amzn1.x86_64
mysql56-bench-5.6.46-1.35.amzn1.x86_64
Red Hat: CVE-2019-2911, CVE-2019-2974
Mitre: CVE-2019-2911, CVE-2019-2974
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | mysql56-embedded-devel | < 5.6.46-1.35.amzn1 | mysql56-embedded-devel-5.6.46-1.35.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mysql56-test | < 5.6.46-1.35.amzn1 | mysql56-test-5.6.46-1.35.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mysql56 | < 5.6.46-1.35.amzn1 | mysql56-5.6.46-1.35.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mysql56-bench | < 5.6.46-1.35.amzn1 | mysql56-bench-5.6.46-1.35.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mysql56-devel | < 5.6.46-1.35.amzn1 | mysql56-devel-5.6.46-1.35.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mysql56-common | < 5.6.46-1.35.amzn1 | mysql56-common-5.6.46-1.35.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mysql56-server | < 5.6.46-1.35.amzn1 | mysql56-server-5.6.46-1.35.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mysql56-embedded | < 5.6.46-1.35.amzn1 | mysql56-embedded-5.6.46-1.35.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mysql56-libs | < 5.6.46-1.35.amzn1 | mysql56-libs-5.6.46-1.35.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mysql56-errmsg | < 5.6.46-1.35.amzn1 | mysql56-errmsg-5.6.46-1.35.amzn1.i686.rpm |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
0.003 Low
EPSS
Percentile
65.6%