CVE-2017-3651

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

29 Aug 2022, 20:52

Type Values Removed Values Added
First Time Redhat enterprise Linux Workstation
Redhat enterprise Linux Eus
Redhat
Mariadb
Redhat enterprise Linux Server
Debian
Redhat openstack
Mariadb mariadb
Debian debian Linux
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Server Tus
Redhat enterprise Linux Desktop
References (DEBIAN) http://www.debian.org/security/2017/dsa-3922 - Patch (DEBIAN) http://www.debian.org/security/2017/dsa-3922 - Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1038928 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1038928 - Broken Link, Third Party Advisory, VDB Entry
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2927.html - Patch (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2927.html - Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2928.html - Patch (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2928.html - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:2729 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:2729 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:2439 - Patch (REDHAT) https://access.redhat.com/errata/RHSA-2018:2439 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2787 - Patch (REDHAT) https://access.redhat.com/errata/RHSA-2017:2787 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2886 - Patch (REDHAT) https://access.redhat.com/errata/RHSA-2017:2886 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2192 - Patch (REDHAT) https://access.redhat.com/errata/RHSA-2017:2192 - Third Party Advisory
CPE cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*

Information

Published : 2017-08-08 15:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-3651

Mitre link : CVE-2017-3651

CVE.ORG link : CVE-2017-3651


JSON object : View

Products Affected

mariadb

  • mariadb

redhat

  • enterprise_linux_workstation
  • enterprise_linux_server_tus
  • openstack
  • enterprise_linux_server
  • enterprise_linux_server_aus
  • enterprise_linux_desktop
  • enterprise_linux_eus

oracle

  • mysql

debian

  • debian_linux