First published: Tue Apr 23 2019(Updated: )
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: libmysqld). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL Installer | >=5.6.0<=5.6.42 | |
Oracle MySQL Installer | >=5.7.0<=5.7.24 | |
Oracle MySQL Installer | >=8.0.0<=8.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3123 is considered a difficult to exploit vulnerability that allows unauthenticated network access.
To fix CVE-2018-3123, upgrade MySQL Server to version 5.6.43 or later, 5.7.25 or later, or 8.0.14 or later.
CVE-2018-3123 affects MySQL versions 5.6.42 and prior, 5.7.24 and prior, and 8.0.13 and prior.
Any users or organizations running the vulnerable versions of MySQL Server with network access are impacted by CVE-2018-3123.
CVE-2018-3123 affects the MySQL Server component, specifically the Server: libmysqld subcomponent.