Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 04:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/103830 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040698 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:1254 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2439 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2729 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:3655 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:1258 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201908-24 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20180419-0002/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3629-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3629-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3629-3/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4176 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4341 - Third Party Advisory |
Information
Published : 2018-04-19 02:29
Updated : 2024-11-21 04:04
NVD link : CVE-2018-2813
Mitre link : CVE-2018-2813
CVE.ORG link : CVE-2018-2813
JSON object : View
Products Affected
mariadb
- mariadb
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- openstack
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_workstation
netapp
- oncommand_unified_manager
- storage_automation_store
- oncommand_insight
- snapcenter
- oncommand_workflow_automation
canonical
- ubuntu_linux
oracle
- mysql
debian
- debian_linux
CWE