CVE-2019-2739
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/07/2019
Last modified:
07/11/2023
Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
Impact
Base Score 3.x
5.10
Severity 3.x
MEDIUM
Base Score 2.0
3.60
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.6.0 (including) | 5.6.44 (including) |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.7.0 (including) | 5.7.26 (including) |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 8.0.0 (including) | 8.0.16 (including) |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
- http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://access.redhat.com/errata/RHSA-2019:2484
- https://access.redhat.com/errata/RHSA-2019:2511
- https://access.redhat.com/errata/RHSA-2019:3708
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
- https://seclists.org/bugtraq/2019/Aug/1
- https://support.f5.com/csp/article/K51272092
- https://support.f5.com/csp/article/K51272092?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4070-1/
- https://usn.ubuntu.com/4070-2/
- https://usn.ubuntu.com/4070-3/