Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-0772.html | Third Party Advisory |
http://secunia.com/advisories/53372 | Third Party Advisory |
http://security.gentoo.org/glsa/glsa-201308-06.xml | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | Broken Link |
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
18 Jul 2022, 18:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux Workstation
Redhat enterprise Linux Eus Mariadb Redhat Redhat enterprise Linux Server Mariadb mariadb Redhat enterprise Linux Server Aus Redhat enterprise Linux Desktop |
|
CPE | cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.64:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.65:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.66:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:* |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Broken Link | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201308-06.xml - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/53372 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-0772.html - Third Party Advisory |
Information
Published : 2013-04-17 12:19
Updated : 2023-12-10 11:16
NVD link : CVE-2013-1521
Mitre link : CVE-2013-1521
CVE.ORG link : CVE-2013-1521
JSON object : View
Products Affected
redhat
- enterprise_linux_server_aus
- enterprise_linux_server
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_eus
oracle
- mysql
mariadb
- mariadb
CWE