mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
126 lines
4.4 KiB
JSON
126 lines
4.4 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2017-3322",
|
||
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||
|
"published": "2017-01-27T22:59:04.663",
|
||
|
"lastModified": "2017-07-26T01:29:05.323",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: NDBAPI). Supported versions that are affected are 7.2.25 and earlier, 7.3.14 and earlier, 7.4.12 and earlier and . Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS v3.0 Base Score 3.7 (Availability impacts)."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Vulnerabilidad en el componente MySQL Cluster de Oracle MySQL (subcomponente: Cluster: NDBAPI). Versiones compatibles que est\u00e1n afectadas son 7.2.25 y versiones anteriores, 7.3.14 y versiones anteriores 7.4.12 y versiones anteriores. Vulnerabilidad de dif\u00edcil explotaci\u00f3n permite a un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos, comprometer MySQL Cluster. Ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para provocar una denegaci\u00f3n de servicio parcial (DOS parcial) de MySQL Cluster. CVSS v3.0 Base Score 3.7 (Impactos de disponibilidad)."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV30": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.0",
|
||
|
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "HIGH",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "LOW",
|
||
|
"baseScore": 3.7,
|
||
|
"baseSeverity": "LOW"
|
||
|
},
|
||
|
"exploitabilityScore": 2.2,
|
||
|
"impactScore": 1.4
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 4.3
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-noinfo"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "7.2.25",
|
||
|
"matchCriteriaId": "070550F1-8546-40D4-A5D6-4F379EC6BA24"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "7.3.14",
|
||
|
"matchCriteriaId": "FDE7B669-245E-42A0-A6FF-DA4032B5019E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "7.4.12",
|
||
|
"matchCriteriaId": "3BB55F73-6DC7-4534-B39D-163A5D565884"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
|
||
|
"source": "secalert_us@oracle.com",
|
||
|
"tags": [
|
||
|
"Patch",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/95574",
|
||
|
"source": "secalert_us@oracle.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securitytracker.com/id/1037640",
|
||
|
"source": "secalert_us@oracle.com"
|
||
|
}
|
||
|
]
|
||
|
}
|