Lucene search

K
nessusTenable9748.PRM
HistoryNov 04, 2016 - 12:00 a.m.

Oracle MySQL 5.6.x < 5.6.34 Multiple Vulnerabilities

2016-11-0400:00:00
Tenable
www.tenable.com
25

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

0.009 Low

EPSS

Percentile

83.1%

The version of MySQL installed on the remote host is version 5.6.x prior to 5.6.34 and is affected by multiple issues :

  • An unspecified flaw exists related to the Security: Encryption subcomponent. This may allow an authenticated remote attacker to disclose potentially sensitive information. No further details have been provided by the vendor. (CVE-2016-5584)
  • A flaw exists that may allow a local attacker with DBA permissions to gain elevated privileges. The issue is due to the program not properly restricting the ability to write to configuration files (e.g. my.cnf), combined with it loading a configuration file from specific locations that current versions do not use (e.g. /var/lib/mysql/my.cnf). This may allow an attacker to leverage specially crafted queries to use logging functionality to create new files or append custom content to existing files. By placing a custom .cnf file that MySQL will load, with a β€˜malloc_lib=’ directive pointing to an attacker controlled β€˜mysql_hookandroot_lib.so’ file, the attacker can cause MySQL to read the configuration file and load the malicious library the next time it starts. This can allow the attacker to gain root privileges. (CVE-2016-6662)
Binary data 9748.prm
VendorProductVersionCPE
oraclemysqlcpe:/a:oracle:mysql

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

0.009 Low

EPSS

Percentile

83.1%