mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
451 lines
15 KiB
JSON
451 lines
15 KiB
JSON
{
|
|
"id": "CVE-2016-0610",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2016-01-21T03:02:37.020",
|
|
"lastModified": "2024-11-21T02:42:02.177",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en Oracle MySQL 5.6.27 y versiones anteriores y MariaDB en versiones anteriores a 10.0.22 y 10.1.x en versiones anteriores a 10.1.9 permite a usuarios remotos autenticados afectar a la disponibilidad a trav\u00e9s de vectores no conocidos relacionados con InnoDB."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"baseScore": 3.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.6.27",
|
|
"matchCriteriaId": "98F0936E-3147-426F-AADF-15B973D3BE74"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.5.46",
|
|
"matchCriteriaId": "728F5CC4-5692-4921-BF0B-E364F87D2A42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3553190A-1EA3-4FDC-838C-1AF34A0D5D1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8B516F9-DA77-45E7-9D1D-C66E49E6F97D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "23E2C5C7-9BCC-476C-BF69-7771C9600D92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB9D5F37-45F0-4F80-84EA-8179931AD303"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21EFF6F8-AD71-4FD6-A37C-9903CF09A87F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "000F198B-4149-4108-8706-89FFE2D15001"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0E9B6400-7126-4C48-9A87-501FC3426DBB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFAE8185-E8C8-4216-AAC2-12C95D8A4964"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1BEE2E7-F0CB-4E39-9E0F-91DB837E2979"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ED693A68-AD80-451E-83CF-D248514688BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0DDD2822-CF30-4087-A9AB-9BCFC5CEACC7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6109E6A-A0FB-44CF-AD80-A510E6ACA899"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2B8DA6D-5E8C-416C-A4C7-BCCB460EBCE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "681C1351-A5C7-4B67-87A9-61F1CA115D39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C2446AD-E917-4614-93B1-7F47A030CC0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83484159-71C4-47DB-8769-F735467E8871"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4D0D3F2-01A4-4294-8665-C6160FB4735C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B69284A6-9B28-4EB8-B214-7EB3968357EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37D79DF6-54FA-4ED8-B0CB-B7B9E6F6A0EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C98121EF-DF6B-4A46-8EE3-0062E9AF0B44"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "717CB721-213B-45F2-ABF8-22C2D9D140CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3FA50A75-019F-4419-8A26-45ECA74FEC35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8992102A-BD39-4BCB-9F92-BA88C5E72830"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8F29B9F5-5C6A-4A48-9A1E-0A552E49780F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74581B16-EC32-4ECA-B761-583B92D3E470"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D77494F3-FE15-4EC0-9F0B-94142177ABB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "63C538D2-B88F-4E12-9557-01112931A656"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DB6247F-C3FD-4204-BD21-2F60E080139B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0162BF64-C53C-446D-BDEE-5B0823FA7869"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD57C2E4-B0E7-429D-BA03-CDEED522B951"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7CE62A44-0584-4070-89D1-17A87B5B19F3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
|
|
"matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
|
|
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/81198",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1034708",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/USN-2881-1",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2016:1132",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/81198",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1034708",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/USN-2881-1",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2016:1132",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |