Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
References
Link | Resource |
---|---|
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:2484 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2511 | Third Party Advisory |
https://support.f5.com/csp/article/K10754336 | Third Party Advisory |
https://support.f5.com/csp/article/K10754336?utm_source=f5support&%3Butm_medium=RSS |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Nov 2023, 03:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
30 Jan 2023, 18:32
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux Eus
Redhat enterprise Linux Redhat Redhat enterprise Linux Server Tus Redhat software Collections Redhat enterprise Linux Server Aus |
|
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2484 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2511 - Third Party Advisory | |
References | (CONFIRM) https://support.f5.com/csp/article/K10754336?utm_source=f5support&utm_medium=RSS - Third Party Advisory | |
References | (CONFIRM) https://support.f5.com/csp/article/K10754336 - Third Party Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:* |
Information
Published : 2019-07-23 23:15
Updated : 2023-12-10 12:59
NVD link : CVE-2019-2810
Mitre link : CVE-2019-2810
CVE.ORG link : CVE-2019-2810
JSON object : View
Products Affected
redhat
- enterprise_linux_server_aus
- software_collections
- enterprise_linux_eus
- enterprise_linux
- enterprise_linux_server_tus
oracle
- mysql
CWE