CVE-2018-3081
Description
Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.0 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).
CWE
- (none)
Affected
- Oracle Corporation / MySQL Server — v=5.5.60 and prior [affected]; v=5.6.40 and prior [affected]; v=5.7.22 and prior [affected]; v=8.0.11 and prior [affected]
CVSS
- (none)
References
- https://www.debian.org/security/2018/dsa-4341 vendor-advisory, x_refsource_DEBIAN
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html x_refsource_CONFIRM
- https://usn.ubuntu.com/3725-1/ vendor-advisory, x_refsource_UBUNTU
- http://www.securitytracker.com/id/1041294 vdb-entry, x_refsource_SECTRACK
- http://www.securityfocus.com/bid/104779 vdb-entry, x_refsource_BID
- https://access.redhat.com/errata/RHSA-2018:3655 vendor-advisory, x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html mailing-list, x_refsource_MLIST
- https://usn.ubuntu.com/3725-2/ vendor-advisory, x_refsource_UBUNTU
- https://security.netapp.com/advisory/ntap-20180726-0002/ x_refsource_CONFIRM
- https://access.redhat.com/errata/RHSA-2019:1258 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2019:2327 vendor-advisory, x_refsource_REDHAT
Source
cvelistV5-main/cves/2018/3xxx/CVE-2018-3081.json