First published: Wed Jul 19 2017(Updated: )
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <5.5.57 | 5.5.57 |
redhat/mysql | <5.6.37 | 5.6.37 |
redhat/mysql | <5.7.19 | 5.7.19 |
MySQL | >=5.5.0<=5.5.56 | |
MySQL | >=5.6.0<=5.6.36 | |
MySQL | >=5.7.0<=5.7.18 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-3652 is considered difficult to exploit, affecting low privileged attackers with network access.
To fix CVE-2017-3652, upgrade your MySQL Server to version 5.5.57, 5.6.37, or 5.7.19 as applicable.
CVE-2017-3652 affects MySQL Server versions 5.5.56 and earlier, 5.6.36 and earlier, and 5.7.18 and earlier.
Yes, CVE-2017-3652 can be exploited by an attacker with low privileges and network access through multiple protocols.
CVE-2017-3652 specifically pertains to the Oracle MySQL Server component and does not refer to other MySQL implementations.