Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
29 Sep 2022, 16:45
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netapp oncommand Balance
Redhat Netapp oncommand Unified Manager Mariadb mariadb Redhat enterprise Linux Eus Redhat enterprise Linux Server Aus Redhat enterprise Linux Desktop Debian Redhat enterprise Linux Server Tus Redhat enterprise Linux Server Mariadb Netapp oncommand Workflow Automation Netapp oncommand Insight Netapp active Iq Unified Manager Redhat openstack Debian debian Linux Netapp snapcenter Netapp Netapp oncommand Performance Manager Redhat enterprise Linux Workstation |
|
CPE | cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.48:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.33:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.32:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.42:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.33:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.52:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.49:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.31:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.36:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.34:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.46:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.31:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.51:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.41:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.53:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.34:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.47:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.32:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.37:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.37:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.50:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.35:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.40:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.35:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.36:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.45:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.7.17:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:* cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:* cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:* |
References | (DEBIAN) http://www.debian.org/security/2017/dsa-4002 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:0279 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:1258 - Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2018/dsa-4341 - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1039597 - Broken Link, Third Party Advisory, VDB Entry | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:3442 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2729 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:0574 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2439 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:3265 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20171019-0002/ - Third Party Advisory | |
CWE | NVD-CWE-noinfo |
Information
Published : 2017-10-19 17:29
Updated : 2023-12-10 12:15
NVD link : CVE-2017-10268
Mitre link : CVE-2017-10268
CVE.ORG link : CVE-2017-10268
JSON object : View
Products Affected
netapp
- oncommand_unified_manager
- snapcenter
- oncommand_balance
- oncommand_insight
- oncommand_performance_manager
- oncommand_workflow_automation
- active_iq_unified_manager
redhat
- enterprise_linux_workstation
- enterprise_linux_server_tus
- openstack
- enterprise_linux_server
- enterprise_linux_server_aus
- enterprise_linux_desktop
- enterprise_linux_eus
mariadb
- mariadb
oracle
- mysql
debian
- debian_linux
CWE