First published: Wed May 20 2020(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mariadb-connector-c | <3.1.8 | 3.1.8 |
redhat/mariadb | <10.4.13 | 10.4.13 |
redhat/mariadb | <10.3.23 | 10.3.23 |
redhat/mariadb | <10.2.32 | 10.2.32 |
debian/mariadb-10.1 | ||
mariadb connector\/c | <3.1.8 | |
openSUSE | =15.1 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13249 is a vulnerability in MariaDB Connector/C before 3.1.8 that allows attackers to send malicious OK packets to the server due to improper content validation.
CVE-2020-13249 has a severity rating of 8.8 (high).
MariaDB Connector/C before 3.1.8, MariaDB 10.4.13, MariaDB 10.3.23, MariaDB 10.2.32, Mariadb Connector/C 3.1.8, openSUSE Leap 15.1, Fedoraproject Fedora 31, Fedoraproject Fedora 32, mariadb-10.3 (debian), mariadb-10.1 (ubuntu), mariadb-10.3 (ubuntu)
To fix CVE-2020-13249, upgrade to MariaDB Connector/C version 3.1.8 or later.
You can find more information about CVE-2020-13249 in the references section.