{ "id": "CVE-2016-0641", "sourceIdentifier": "secalert_us@oracle.com", "published": "2016-04-21T10:59:10.883", "lastModified": "2019-12-27T16:08:55.810", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Oracle MySQL 5.5.47 y versiones anteriores, 5.6.28 y versiones anteriores y 5.7.10 y versiones anteriores y MariaDB en versiones anteriores a 5.5.48, 10.0.x en versiones anteriores a 10.0.24 y 10.1.x en versiones anteriores a 10.1.12 permite a usuarios locales afectar la confidencialidad y la disponibilidad a trav\u00e9s de vectores relacionados con MyISAM." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 0.8, "impactScore": 4.2 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.9 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.5.0", "versionEndIncluding": "5.5.47", "matchCriteriaId": "FBAF0151-A5FD-47E3-B133-8ECEBBB2A5BC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.6.0", "versionEndIncluding": "5.6.28", "matchCriteriaId": "019CB260-F5E2-4BA4-B24E-6E9BC1ECF970" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.7.0", "versionEndIncluding": "5.7.10", "matchCriteriaId": "A191A8E6-7CA5-44B1-9905-9255E94D9291" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "161594FF-0DF8-43C8-B532-EBB20228023D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0744845-0230-47E7-866A-0880832B31C8" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "matchCriteriaId": "104DA87B-DEE4-4262-AE50-8E6BC43B228B" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.5.20", "versionEndIncluding": "5.5.47", "matchCriteriaId": "F0DA4E5C-D01C-48CC-9AF5-8EB760ADEAC8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0.0", "versionEndExcluding": "10.0.24", "matchCriteriaId": "55258E77-FBA8-4503-9F6B-736F9C420089" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.1.0", "versionEndExcluding": "10.1.12", "matchCriteriaId": "12B05AAB-03D7-4436-AFB2-0F43044A55AF" } ] } ] } ], "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html", "source": "secalert_us@oracle.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html", "source": "secalert_us@oracle.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", "source": "secalert_us@oracle.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", "source": "secalert_us@oracle.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", "source": "secalert_us@oracle.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-1480.html", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-1481.html", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-1602.html", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.debian.org/security/2016/dsa-3557", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.debian.org/security/2016/dsa-3595", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/86470", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id/1035606", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.ubuntu.com/usn/USN-2953-1", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2016:1132", "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/", "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/", "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/", "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ] } ] }