CVE-2015-0499
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/04/2015
Last modified:
12/04/2025
Description
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
Impact
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.42 (including) |
| cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.6.0 (including) | 5.6.23 (including) |
| cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://rhn.redhat.com/errata/RHSA-2015-1629.html
- http://rhn.redhat.com/errata/RHSA-2015-1647.html
- http://rhn.redhat.com/errata/RHSA-2015-1665.html
- http://www.debian.org/security/2015/dsa-3229
- http://www.debian.org/security/2015/dsa-3311
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A227
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.securitytracker.com/id/1032121
- http://www.ubuntu.com/usn/USN-2575-1
- https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/
- https://security.gentoo.org/glsa/201507-19
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://rhn.redhat.com/errata/RHSA-2015-1629.html
- http://rhn.redhat.com/errata/RHSA-2015-1647.html
- http://rhn.redhat.com/errata/RHSA-2015-1665.html
- http://www.debian.org/security/2015/dsa-3229
- http://www.debian.org/security/2015/dsa-3311
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A227
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.securitytracker.com/id/1032121
- http://www.ubuntu.com/usn/USN-2575-1
- https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/
- https://security.gentoo.org/glsa/201507-19



