CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
54.3%
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | mysql | * | cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* |
mariadb | mariadb | * | cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* |
debian | debian_linux | 8.0 | cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
redhat | openstack | 12 | cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 7.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 7.4 | cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 7.5 | cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 7.6 | cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 7.7 | cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 7.0 | cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* |
[
{
"product": "MySQL Server",
"vendor": "Oracle Corporation",
"versions": [
{
"status": "affected",
"version": "5.5.56 and earlier"
},
{
"status": "affected",
"version": "5.6.36 and earlier"
},
{
"status": "affected",
"version": "5.7.18 and earlier"
}
]
}
]
rhn.redhat.com/errata/RHSA-2016-2927.html
rhn.redhat.com/errata/RHSA-2016-2928.html
www.debian.org/security/2017/dsa-3922
www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
www.securityfocus.com/bid/99802
www.securitytracker.com/id/1038928
access.redhat.com/errata/RHSA-2017:2192
access.redhat.com/errata/RHSA-2017:2787
access.redhat.com/errata/RHSA-2017:2886
access.redhat.com/errata/RHSA-2018:2439
access.redhat.com/errata/RHSA-2018:2729
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
54.3%