First published: Wed Oct 21 2020(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <5.6.50 | 5.6.50 |
redhat/mysql | <5.7.32 | 5.7.32 |
redhat/mysql | <8.0.22 | 8.0.22 |
Oracle MySQL | >=5.6.0<=5.6.49 | |
Oracle MySQL | >=5.7.0<=5.7.31 | |
Oracle MySQL | >=8.0.0<=8.0.21 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
NetApp Active IQ Unified Manager | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
NetApp SnapCenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14867 has a high severity rating due to its potential to allow high privileged attackers network access.
CVE-2020-14867 affects MySQL versions 5.6.49 and prior, 5.7.31 and prior, and 8.0.21 and prior.
To address CVE-2020-14867, upgrade MySQL to version 5.6.50, 5.7.32, or 8.0.22 as applicable.
CVE-2020-14867 can be exploited remotely by an attacker with high privileges using various network protocols.
There are no known workarounds for CVE-2020-14867; updating to a secure version is recommended.