CVE-2016-5629
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/10/2016
Last modified:
12/04/2025
Description
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.
Impact
Base Score 3.x
4.90
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.51 (including) |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.6.0 (including) | 5.6.32 (including) |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.7.0 (including) | 5.7.14 (including) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.52 (excluding) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.0.0 (including) | 10.0.28 (excluding) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.1.0 (including) | 10.1.18 (excluding) |
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93668
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93668
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01