2024-12-08 03:06:42 +00:00

139 lines
4.7 KiB
JSON

{
"id": "CVE-2017-3251",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2017-01-27T22:59:02.663",
"lastModified": "2024-11-21T03:25:07.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.9 (Availability impacts)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el componente MySQL Server component de Oracle MySQL (Subcomponente: Server: Optimizer). Versiones compatibles que est\u00e1n afectadas son 5.7.16 y versiones anteriores. Vulnerabilidad f\u00e1cilmente explotable permite a atacantes privilegiados elevados con acceso a la red a trav\u00e9s de m\u00faltiples protocolos, comprometer MySQL Server. Ataques exitosos de esta vulnerabilidad pueden resultar en capacidad no autorizada para provocar un cuelgue o bloqueo frecuentemente repetible (DOS completo) de MySQL Server. CVSS v3.0 Base Score 4.9 (Impactos de Disponibilidad)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.7.16",
"matchCriteriaId": "8DC73DC2-8D62-4ED4-AC91-CCC929BDC846"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.securityfocus.com/bid/95482",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.securitytracker.com/id/1037640",
"source": "secalert_us@oracle.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:2886",
"source": "secalert_us@oracle.com"
},
{
"url": "https://security.gentoo.org/glsa/201702-17",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/95482",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id/1037640",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:2886",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.gentoo.org/glsa/201702-17",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}