First published: Wed Jan 17 2018(Updated: )
Last updated 24 July 2024
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <5.6.39 | 5.6.39 |
redhat/mysql | <5.7.21 | 5.7.21 |
debian/mysql-5.5 | ||
debian/mysql-5.7 | ||
MySQL | >=5.6.0<=5.6.38 | |
MySQL | >=5.7.0<=5.7.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2573 has been classified as an easily exploitable low severity vulnerability in MySQL Server.
To mitigate CVE-2018-2573, upgrade MySQL Server to version 5.6.39 or later for the 5.6 series, and to version 5.7.21 or later for the 5.7 series.
The affected versions of MySQL for CVE-2018-2573 are 5.6.38 and prior, as well as 5.7.20 and prior.
CVE-2018-2573 can be exploited by low privileged attackers with network access via multiple protocols.
Yes, patches are available in MySQL Server versions 5.6.39 and 5.7.21, which address the vulnerability.