CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
73.8%
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | mysql_server | * | cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* |
fedoraproject | fedora | 37 | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
fedoraproject | fedora | 38 | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
fedoraproject | fedora | 39 | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
netapp | active_iq_unified_manager | - | cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* |
netapp | active_iq_unified_manager | - | cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* |
netapp | oncommand_insight | - | cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* |
netapp | oncommand_workflow_automation | - | cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* |
netapp | snapcenter | - | cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* |
[
{
"vendor": "Oracle Corporation",
"product": "MySQL Server",
"versions": [
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "8.0.33",
"versionType": "custom"
}
]
}
]
lists.fedoraproject.org/archives/list/[email protected]/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
lists.fedoraproject.org/archives/list/[email protected]/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
lists.fedoraproject.org/archives/list/[email protected]/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
security.netapp.com/advisory/ntap-20230725-0005/
www.oracle.com/security-alerts/cpujul2023.html