CVE-2018-2562

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*

History

01 Jul 2022, 14:13

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2018/dsa-4341 - (DEBIAN) https://www.debian.org/security/2018/dsa-4341 - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/3537-2/ - (UBUNTU) https://usn.ubuntu.com/3537-2/ - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/3537-1/ - (UBUNTU) https://usn.ubuntu.com/3537-1/ - Broken Link
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1258 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1258 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:0587 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:0587 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html - (MLIST) https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:2729 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:2729 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:2439 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:2439 - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2018/dsa-4091 - (DEBIAN) https://www.debian.org/security/2018/dsa-4091 - Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1040216 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1040216 - Broken Link, Third Party Advisory, VDB Entry
References (MLIST) https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html - (MLIST) https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html - Mailing List, Third Party Advisory
First Time Redhat enterprise Linux Workstation
Redhat enterprise Linux Server
Canonical
Debian debian Linux
Netapp
Netapp snapcenter
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Desktop
Redhat enterprise Linux Eus
Redhat
Mariadb
Mariadb mariadb
Debian
Redhat openstack
Canonical ubuntu Linux
Netapp oncommand Workflow Automation
Netapp oncommand Insight
Netapp active Iq Unified Manager
Redhat enterprise Linux Server Tus
CPE cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*

Information

Published : 2018-01-18 02:29

Updated : 2023-12-10 12:15


NVD link : CVE-2018-2562

Mitre link : CVE-2018-2562

CVE.ORG link : CVE-2018-2562


JSON object : View

Products Affected

redhat

  • enterprise_linux_server_aus
  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_server
  • enterprise_linux_server_tus
  • openstack

canonical

  • ubuntu_linux

mariadb

  • mariadb

oracle

  • mysql

netapp

  • snapcenter
  • active_iq_unified_manager
  • oncommand_insight
  • oncommand_workflow_automation

debian

  • debian_linux