CVE-2014-2494

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Dec/23 Mailing List Third Party Advisory
http://secunia.com/advisories/60425 Not Applicable
http://www.debian.org/security/2014/dsa-2985 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html Vendor Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threaded Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030578 Broken Link Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2014-0012.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Dec/23 Mailing List Third Party Advisory
http://secunia.com/advisories/60425 Not Applicable
http://www.debian.org/security/2014/dsa-2985 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html Vendor Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threaded Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030578 Broken Link Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2014-0012.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:06

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2014/Dec/23 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2014/Dec/23 - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/60425 - Not Applicable () http://secunia.com/advisories/60425 - Not Applicable
References () http://www.debian.org/security/2014/dsa-2985 - Third Party Advisory () http://www.debian.org/security/2014/dsa-2985 - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Vendor Advisory () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - Vendor Advisory () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - Vendor Advisory
References () http://www.securityfocus.com/archive/1/534161/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/534161/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1030578 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1030578 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vmware.com/security/advisories/VMSA-2014-0012.html - Third Party Advisory () http://www.vmware.com/security/advisories/VMSA-2014-0012.html - Third Party Advisory

Information

Published : 2014-07-17 05:10

Updated : 2024-11-21 02:06


NVD link : CVE-2014-2494

Mitre link : CVE-2014-2494

CVE.ORG link : CVE-2014-2494


JSON object : View

Products Affected

mariadb

  • mariadb

suse

  • linux_enterprise_workstation_extension
  • linux_enterprise_software_development_kit
  • linux_enterprise_server
  • linux_enterprise_desktop

oracle

  • mysql

debian

  • debian_linux