Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html | Mailing List Third Party Advisory |
http://osvdb.org/95328 | Broken Link |
http://secunia.com/advisories/53372 | Not Applicable |
http://secunia.com/advisories/54300 | Not Applicable |
http://security.gentoo.org/glsa/glsa-201308-06.xml | Third Party Advisory |
http://www.debian.org/security/2013/dsa-2818 | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html | Vendor Advisory |
http://www.ubuntu.com/usn/USN-1909-1 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/85715 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
26 Aug 2022, 16:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.68:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.67:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.64:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.65:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.66:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* |
First Time |
Opensuse opensuse
Suse linux Enterprise Server Mariadb Mariadb mariadb Debian Canonical ubuntu Linux Canonical Suse linux Enterprise Software Development Kit Debian debian Linux Opensuse Suse linux Enterprise Desktop Suse |
|
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html - Mailing List, Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2013/dsa-2818 - Third Party Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/85715 - Third Party Advisory, VDB Entry | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1909-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/54300 - Not Applicable | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html - Mailing List, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/53372 - Not Applicable | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201308-06.xml - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html - Mailing List, Third Party Advisory | |
References | (OSVDB) http://osvdb.org/95328 - Broken Link |
Information
Published : 2013-07-17 13:41
Updated : 2023-12-10 11:16
NVD link : CVE-2013-3804
Mitre link : CVE-2013-3804
CVE.ORG link : CVE-2013-3804
JSON object : View
Products Affected
mariadb
- mariadb
suse
- linux_enterprise_server
- linux_enterprise_desktop
- linux_enterprise_software_development_kit
oracle
- mysql
opensuse
- opensuse
canonical
- ubuntu_linux
debian
- debian_linux
CWE