Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2012-1462.html | Third Party Advisory |
http://secunia.com/advisories/51177 | Not Applicable |
http://secunia.com/advisories/51309 | Not Applicable |
http://secunia.com/advisories/53372 | Not Applicable |
http://secunia.com/advisories/56509 | Not Applicable |
http://secunia.com/advisories/56513 | Not Applicable |
http://security.gentoo.org/glsa/glsa-201308-06.xml | Third Party Advisory |
http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html | Third Party Advisory |
http://www.debian.org/security/2012/dsa-2581 | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html | Patch Third Party Advisory |
http://www.ubuntu.com/usn/USN-1621-1 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79381 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
27 Jun 2022, 16:27
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux Workstation
F5 big-ip Webaccelerator F5 big-ip Link Controller F5 big-ip Application Security Manager Redhat enterprise Linux Server F5 big-ip Enterprise Manager F5 big-ip Access Policy Manager F5 big-ip Edge Gateway Canonical F5 big-ip Policy Enforcement Manager Debian debian Linux F5 big-ip Wan Optimization Manager F5 big-ip Advanced Firewall Manager F5 big-ip Global Traffic Manager Redhat enterprise Linux Desktop Redhat enterprise Linux Eus F5 Redhat Mariadb Mariadb mariadb Debian F5 big-ip Analytics Canonical ubuntu Linux F5 big-ip Local Traffic Manager F5 big-ip Protocol Security Module |
|
References | (SECUNIA) http://secunia.com/advisories/56509 - Not Applicable | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - Patch, Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1462.html - Third Party Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/79381 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/51177 - Not Applicable | |
References | (DEBIAN) http://www.debian.org/security/2012/dsa-2581 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/53372 - Not Applicable | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201308-06.xml - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/51309 - Not Applicable | |
References | (CONFIRM) http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/56513 - Not Applicable | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1621-1 - Third Party Advisory | |
CPE | cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* |
Information
Published : 2012-10-17 00:55
Updated : 2023-12-10 11:16
NVD link : CVE-2012-3163
Mitre link : CVE-2012-3163
CVE.ORG link : CVE-2012-3163
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_eus
f5
- big-ip_protocol_security_module
- big-ip_edge_gateway
- big-ip_analytics
- big-ip_enterprise_manager
- big-ip_webaccelerator
- big-ip_application_security_manager
- big-ip_global_traffic_manager
- big-ip_advanced_firewall_manager
- big-ip_access_policy_manager
- big-ip_local_traffic_manager
- big-ip_policy_enforcement_manager
- big-ip_wan_optimization_manager
- big-ip_link_controller
oracle
- mysql
canonical
- ubuntu_linux
debian
- debian_linux
mariadb
- mariadb
CWE