First published: Wed Jan 15 2020(Updated: )
A vulnerability was found in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. Reference: <a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a>
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mysql-5.7 | ||
redhat/mysql | <5.7.29 | 5.7.29 |
redhat/mysql | <8.0.19 | 8.0.19 |
MySQL | >=5.7.0<=5.7.28 | |
MySQL | >=8.0.0<=8.0.18 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2570 has been classified as a difficult to exploit vulnerability affecting specific versions of MySQL.
To address CVE-2020-2570, upgrade MySQL to version 5.7.29 or 8.0.19 or later.
CVE-2020-2570 affects MySQL versions 5.7.28 and prior and 8.0.18 and prior.
CVE-2020-2570 can be exploited by unauthenticated attackers with network access.
CVE-2020-2570 can be compromised via multiple network protocols.