Unrated severityNVD Advisory· Published Jan 18, 2018· Updated Oct 3, 2024
CVE-2018-2622
CVE-2018-2622
Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Affected products
42- osv-coords41 versionspkg:rpm/suse/galera-3&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/lz4&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/lz4&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/lz4&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/mariadb-connector-c&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/mariadb-connector-c&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/mariadb-connector-c&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/mariadb-connector-c&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/mariadb&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/mysql&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/mysql&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/mysql&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/rubygem-mysql2&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/xtrabackup&distro=SUSE%20OpenStack%20Cloud%207
< 25.3.23-8.3+ 40 more
- (no CPE)range: < 25.3.23-8.3
- (no CPE)range: < 1.8.0-3.5.2
- (no CPE)range: < 1.8.0-3.5.2
- (no CPE)range: < 1.8.0-3.5.2
- (no CPE)range: < 10.4.30-150100.3.5.10
- (no CPE)range: < 10.4.30-8.5.46
- (no CPE)range: < 10.4.30-150100.3.5.10
- (no CPE)range: < 10.4.30-8.5.46
- (no CPE)range: < 10.4.30-150100.3.5.10
- (no CPE)range: < 10.4.30-8.5.46
- (no CPE)range: < 3.1.22-2.35.1
- (no CPE)range: < 3.1.22-2.35.1
- (no CPE)range: < 3.1.22-2.35.1
- (no CPE)range: < 3.0.3-1.3.3
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-20.43.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.2.15-7.1
- (no CPE)range: < 5.5.59-0.39.9.8
- (no CPE)range: < 5.5.59-0.39.9.8
- (no CPE)range: < 5.5.59-0.39.9.8
- (no CPE)range: < 1.4.6-150100.3.3.7
- (no CPE)range: < 1.3.14-8.9.2
- (no CPE)range: < 1.4.6-150100.3.3.7
- (no CPE)range: < 1.3.14-8.9.2
- (no CPE)range: < 1.4.6-150100.3.3.7
- (no CPE)range: < 1.3.14-8.9.2
- (no CPE)range: < 0.4.10-7.2
- (no CPE)range: < 2.4.10-5.3
- Oracle Corporation/MySQL Serverv5Range: 5.5.58 and prior
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- access.redhat.com/errata/RHSA-2018:0586mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:0587mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2439mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2729mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:1258mitrevendor-advisoryx_refsource_REDHAT
- usn.ubuntu.com/3537-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3537-2/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4091mitrevendor-advisoryx_refsource_DEBIAN
- www.debian.org/security/2018/dsa-4341mitrevendor-advisoryx_refsource_DEBIAN
- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlmitrex_refsource_CONFIRM
- www.securityfocus.com/bid/102706mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1040216mitrevdb-entryx_refsource_SECTRACK
- lists.debian.org/debian-lts-announce/2018/01/msg00024.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2018/06/msg00015.htmlmitremailing-listx_refsource_MLIST
- security.netapp.com/advisory/ntap-20180117-0002/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.