CVE-2012-3158

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2012-1462.html Third Party Advisory
http://secunia.com/advisories/51177 Not Applicable
http://secunia.com/advisories/51309 Not Applicable
http://secunia.com/advisories/53372 Not Applicable
http://security.gentoo.org/glsa/glsa-201308-06.xml Third Party Advisory
http://www.debian.org/security/2012/dsa-2581 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:102 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html Patch Vendor Advisory
http://www.ubuntu.com/usn/USN-1621-1 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/79382 Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2012-1462.html Third Party Advisory
http://secunia.com/advisories/51177 Not Applicable
http://secunia.com/advisories/51309 Not Applicable
http://secunia.com/advisories/53372 Not Applicable
http://security.gentoo.org/glsa/glsa-201308-06.xml Third Party Advisory
http://www.debian.org/security/2012/dsa-2581 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:102 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html Patch Vendor Advisory
http://www.ubuntu.com/usn/USN-1621-1 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/79382 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:40

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2012-1462.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-1462.html - Third Party Advisory
References () http://secunia.com/advisories/51177 - Not Applicable () http://secunia.com/advisories/51177 - Not Applicable
References () http://secunia.com/advisories/51309 - Not Applicable () http://secunia.com/advisories/51309 - Not Applicable
References () http://secunia.com/advisories/53372 - Not Applicable () http://secunia.com/advisories/53372 - Not Applicable
References () http://security.gentoo.org/glsa/glsa-201308-06.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201308-06.xml - Third Party Advisory
References () http://www.debian.org/security/2012/dsa-2581 - Third Party Advisory () http://www.debian.org/security/2012/dsa-2581 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:102 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2013:102 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Broken Link
References () http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - Patch, Vendor Advisory
References () http://www.ubuntu.com/usn/USN-1621-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1621-1 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/79382 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/79382 - Third Party Advisory, VDB Entry

Information

Published : 2012-10-16 23:55

Updated : 2024-11-21 01:40


NVD link : CVE-2012-3158

Mitre link : CVE-2012-3158

CVE.ORG link : CVE-2012-3158


JSON object : View

Products Affected

mariadb

  • mariadb

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

oracle

  • mysql

debian

  • debian_linux