2.8 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
MULTIPLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:M/C:N/I:N/A:P
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2013-5807, CVE-2013-5891, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437, CVE-2013-3839, CVE-2013-5908) A buffer overflow flaw was found in the way the MySQL command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MySQL server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client. (CVE-2014-0001) The CVE-2014-0001 issue was discovered by Garth Mollett of the Red Hat Security Response Team. These updated packages upgrade MySQL to version 5.5.36. Refer to the MySQL Release Notes listed in the References section for a complete list of changes. All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
CPE | Name | Operator | Version |
---|---|---|---|
mysql55-mysql | eq | 5.5.32__3.el5 | |
mysql55-mysql | eq | 5.5.32__3.el5 |
dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-36.html
osvdb.org/102077
rhn.redhat.com/errata/RHSA-2014-0173.html
rhn.redhat.com/errata/RHSA-2014-0186.html
rhn.redhat.com/errata/RHSA-2014-0189.html
secunia.com/advisories/56491
secunia.com/advisories/56580
security.gentoo.org/glsa/glsa-201409-04.xml
ubuntu.com/usn/usn-2086-1
www.debian.org/security/2014/dsa-2848
www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html#AppendixMSQL
www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html#AppendixMSQL
www.securityfocus.com/bid/64758
www.securityfocus.com/bid/64888
access.redhat.com/security/updates/classification/#moderate
exchange.xforce.ibmcloud.com/vulnerabilities/90388
rhn.redhat.com/errata/RHSA-2014-0186.html