CVE-2016-6662
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
20/09/2016
Last modified:
12/04/2025
Description
Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.52 (including) |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.6.0 (including) | 5.6.33 (including) |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.7.0 (including) | 5.7.15 (including) |
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:* | 5.5 (including) | 5.5.51-38.1 (excluding) |
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:* | 5.6 (including) | 5.6.32-78.0 (excluding) |
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:* | 5.7 (including) | 5.7.14-7 (excluding) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 5.5.20 (including) | 5.5.51 (excluding) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.0.0 (including) | 10.0.27 (excluding) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.1.0 (including) | 10.1.17 (excluding) |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
- http://rhn.redhat.com/errata/RHSA-2016-2058.html
- http://rhn.redhat.com/errata/RHSA-2016-2059.html
- http://rhn.redhat.com/errata/RHSA-2016-2060.html
- http://rhn.redhat.com/errata/RHSA-2016-2061.html
- http://rhn.redhat.com/errata/RHSA-2016-2062.html
- http://rhn.redhat.com/errata/RHSA-2016-2077.html
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://rhn.redhat.com/errata/RHSA-2017-0184.html
- http://seclists.org/fulldisclosure/2016/Sep/23
- http://www.debian.org/security/2016/dsa-3666
- http://www.openwall.com/lists/oss-security/2016/09/12/3
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/92912
- http://www.securitytracker.com/id/1036769
- https://jira.mariadb.org/browse/MDEV-10465
- https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
- https://security.gentoo.org/glsa/201701-01
- https://www.exploit-db.com/exploits/40360/
- https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
- http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
- http://rhn.redhat.com/errata/RHSA-2016-2058.html
- http://rhn.redhat.com/errata/RHSA-2016-2059.html
- http://rhn.redhat.com/errata/RHSA-2016-2060.html
- http://rhn.redhat.com/errata/RHSA-2016-2061.html
- http://rhn.redhat.com/errata/RHSA-2016-2062.html
- http://rhn.redhat.com/errata/RHSA-2016-2077.html
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://rhn.redhat.com/errata/RHSA-2017-0184.html
- http://seclists.org/fulldisclosure/2016/Sep/23
- http://www.debian.org/security/2016/dsa-3666
- http://www.openwall.com/lists/oss-security/2016/09/12/3
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/92912
- http://www.securitytracker.com/id/1036769
- https://jira.mariadb.org/browse/MDEV-10465
- https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
- https://security.gentoo.org/glsa/201701-01
- https://www.exploit-db.com/exploits/40360/
- https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/