Unrated severityNVD Advisory· Published Jan 18, 2018· Updated Oct 3, 2024
CVE-2018-2640
CVE-2018-2640
Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Affected products
41- osv-coords41 versionspkg:rpm/suse/galera-3&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/lz4&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/lz4&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/lz4&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/mariadb104&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/mariadb-connector-c&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/mariadb-connector-c&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/mariadb-connector-c&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/mariadb-connector-c&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/mariadb&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/mysql&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/mysql&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/mysql&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/python-mysqlclient&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/rubygem-mysql2&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/xtrabackup&distro=SUSE%20OpenStack%20Cloud%207
< 25.3.23-8.3+ 40 more
- (no CPE)range: < 25.3.23-8.3
- (no CPE)range: < 1.8.0-3.5.2
- (no CPE)range: < 1.8.0-3.5.2
- (no CPE)range: < 1.8.0-3.5.2
- (no CPE)range: < 10.4.30-150100.3.5.10
- (no CPE)range: < 10.4.30-8.5.46
- (no CPE)range: < 10.4.30-150100.3.5.10
- (no CPE)range: < 10.4.30-8.5.46
- (no CPE)range: < 10.4.30-150100.3.5.10
- (no CPE)range: < 10.4.30-8.5.46
- (no CPE)range: < 3.1.22-2.35.1
- (no CPE)range: < 3.1.22-2.35.1
- (no CPE)range: < 3.1.22-2.35.1
- (no CPE)range: < 3.0.3-1.3.3
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-20.43.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.0.34-29.16.1
- (no CPE)range: < 10.2.15-7.1
- (no CPE)range: < 5.5.59-0.39.9.8
- (no CPE)range: < 5.5.59-0.39.9.8
- (no CPE)range: < 5.5.59-0.39.9.8
- (no CPE)range: < 1.4.6-150100.3.3.7
- (no CPE)range: < 1.3.14-8.9.2
- (no CPE)range: < 1.4.6-150100.3.3.7
- (no CPE)range: < 1.3.14-8.9.2
- (no CPE)range: < 1.4.6-150100.3.3.7
- (no CPE)range: < 1.3.14-8.9.2
- (no CPE)range: < 0.4.10-7.2
- (no CPE)range: < 2.4.10-5.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- access.redhat.com/errata/RHSA-2018:0586mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:0587mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2439mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2729mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:1258mitrevendor-advisoryx_refsource_REDHAT
- usn.ubuntu.com/3537-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3537-2/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4091mitrevendor-advisoryx_refsource_DEBIAN
- www.debian.org/security/2018/dsa-4341mitrevendor-advisoryx_refsource_DEBIAN
- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlmitrex_refsource_CONFIRM
- www.securityfocus.com/bid/102678mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1040216mitrevdb-entryx_refsource_SECTRACK
- lists.debian.org/debian-lts-announce/2018/01/msg00024.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2018/06/msg00015.htmlmitremailing-listx_refsource_MLIST
- security.netapp.com/advisory/ntap-20180117-0002/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.