First published: Wed Oct 15 2014(Updated: )
Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =11.3 | |
MySQL | >=5.5.0<=5.5.38 | |
MySQL | >=5.6.0<=5.6.19 | |
SUSE Linux Enterprise Desktop with Beagle | =12 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Workstation Extension | =12 | |
Mariadb Mariadb | >=5.5.0<5.5.39 | |
Mariadb Mariadb | >=10.0.0<10.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6463 is considered to be a moderate severity vulnerability that affects the availability of the system.
To fix CVE-2014-6463, update your Oracle MySQL Server to the latest version available, ensuring you are beyond 5.5.38 for 5.5 releases or 5.6.19 for 5.6 releases.
CVE-2014-6463 affects remote authenticated users of Oracle MySQL Server versions 5.5.38 and earlier as well as 5.6.19 and earlier.
CVE-2014-6463 impacts the server's replication row format binary log DML, which can affect system availability.
No specific workarounds are documented for CVE-2014-6463; the recommended action is to upgrade to a patched version.