First published: Mon Apr 24 2017(Updated: )
Vulnerability in the MySQL Enterprise Monitor component of Oracle MySQL (subcomponent: Monitoring: Server). Supported versions that are affected are 3.1.6.8003 and earlier, 3.2.1182 and earlier and 3.3.2.1162 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Enterprise Monitor. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Enterprise Monitor accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Enterprise Monitor. CVSS 3.0 Base Score 3.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
oracle mysql enterprise monitor | >=3.1.0<=3.1.6.8003 | |
oracle mysql enterprise monitor | >=3.2.0<=3.2.1182 | |
oracle mysql enterprise monitor | >=3.3.0<=3.3.2.1162 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3307 has been classified as difficult to exploit, but it poses a potential risk if exploited by a high privileged attacker.
To fix CVE-2017-3307, upgrade your MySQL Enterprise Monitor to version 3.1.6.8004 or later, 3.2.1183 or later, or 3.3.2.1163 or later.
The affected versions for CVE-2017-3307 include MySQL Enterprise Monitor 3.1.6.8003 and earlier, 3.2.1182 and earlier, and 3.3.2.1162 and earlier.
CVE-2017-3307 impacts organizations using affected versions of MySQL Enterprise Monitor, particularly those with high privileged accounts.
CVE-2017-3307 specifically affects the Monitoring: Server component of Oracle MySQL's Enterprise Monitor.