CVE-2017-3600

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:25

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2927.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2927.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2928.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2928.html - Third Party Advisory
References () http://www.debian.org/security/2017/dsa-3834 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3834 - Third Party Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/97765 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97765 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038287 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038287 - Broken Link, Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:2192 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2192 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2787 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2787 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2886 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2886 - Third Party Advisory

Information

Published : 2017-04-24 19:59

Updated : 2024-11-21 03:25


NVD link : CVE-2017-3600

Mitre link : CVE-2017-3600

CVE.ORG link : CVE-2017-3600


JSON object : View

Products Affected

mariadb

  • mariadb

redhat

  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_server_tus
  • enterprise_linux_workstation

oracle

  • mysql

debian

  • debian_linux