Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).
References
Link | Resource |
---|---|
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/103954 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041294 | Broken Link Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:2439 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2729 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20180726-0002/ | Third Party Advisory |
https://usn.ubuntu.com/3725-1/ | Third Party Advisory |
https://usn.ubuntu.com/3725-2/ | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4341 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Sep 2022, 19:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* |
|
First Time |
Netapp oncommand Workflow Automation
Redhat enterprise Linux Server Netapp snapcenter Redhat enterprise Linux Desktop Redhat Netapp oncommand Insight Redhat enterprise Linux Workstation Canonical ubuntu Linux Redhat enterprise Linux Server Tus Redhat openstack Debian Debian debian Linux Redhat enterprise Linux Server Aus Canonical Mariadb Netapp Mariadb mariadb Redhat enterprise Linux Eus |
|
References | (UBUNTU) https://usn.ubuntu.com/3725-2/ - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/3725-1/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2729 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2018:2439 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20180726-0002/ - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/103954 - Third Party Advisory, VDB Entry | |
References | (DEBIAN) https://www.debian.org/security/2018/dsa-4341 - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1041294 - Broken Link, Third Party Advisory, VDB Entry |
Information
Published : 2018-07-18 13:29
Updated : 2023-12-10 12:44
NVD link : CVE-2018-2767
Mitre link : CVE-2018-2767
CVE.ORG link : CVE-2018-2767
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux_server_aus
- openstack
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_eus
oracle
- mysql
netapp
- oncommand_workflow_automation
- snapcenter
- oncommand_insight
mariadb
- mariadb
canonical
- ubuntu_linux
CWE