First published: Wed Oct 15 2014(Updated: )
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wolfssl | 4.6.0+p1-0+deb11u2 5.5.4-2+deb12u1 5.7.0-0.3 | |
Oracle Solaris SPARC | =11.3 | |
Juniper Networks Junos Space | <=15.1 | |
MariaDB | >=5.5.0<5.5.40 | |
MariaDB | >=10.0.0<10.0.15 | |
MySQL | >=5.5.0<=5.5.39 | |
MySQL | >=5.6.0<=5.6.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6500 has a high severity rating due to its potential impact on confidentiality, integrity, and availability.
To fix CVE-2014-6500, upgrade to a version of Oracle MySQL Server that is above 5.5.39 or 5.6.20.
CVE-2014-6500 affects Oracle MySQL Server versions 5.5.39 and earlier, and 5.6.20 and earlier, as well as specific versions of MariaDB and other related software.
Exploitation of CVE-2014-6500 can lead to unauthorized access, data breaches, and service disruptions.
There are no known workarounds for CVE-2014-6500; upgrading to a patched version is the recommended action.