First published: Wed Oct 15 2014(Updated: )
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | <=15.1 | |
Ariadne CMS | >=5.5.0<5.5.40 | |
Ariadne CMS | >=10.0.0<10.0.15 | |
Oracle Solaris SPARC | =11.3 | |
MySQL | >=5.5.0<=5.5.39 | |
MySQL | >=5.6.0<=5.6.20 | |
SUSE Linux Enterprise Desktop with Beagle | =12 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Workstation Extension | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6559 is classified as a medium-severity vulnerability due to its potential impact on confidentiality.
To fix CVE-2014-6559, update Oracle MySQL Server to a version later than 5.5.39 or 5.6.20.
CVE-2014-6559 affects Oracle MySQL Server versions 5.5.39 and earlier, and 5.6.20 and earlier, along with certain versions of MariaDB and Juniper's Junos Space.
Exploiting CVE-2014-6559 can lead to unauthorized access to sensitive data, compromising the confidentiality of the affected systems.
There are no recommended workarounds for CVE-2014-6559; updating the software is the advised mitigation.