First published: Wed Jan 15 2020(Updated: )
A vulnerability was found in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. Reference: <a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a>
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mysql-5.7 | ||
redhat/mysql | <5.7.29 | 5.7.29 |
redhat/mysql | <8.0.19 | 8.0.19 |
MySQL | >=5.7.0<=5.7.28 | |
MySQL | >=8.0.0<=8.0.18 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp active iq unified manager windows | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp snapcenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2573 is classified as a difficult to exploit vulnerability that affects multiple versions of MySQL.
To fix CVE-2020-2573, upgrade your MySQL installation to version 5.7.29 or later, or version 8.0.19 or later.
CVE-2020-2573 affects MySQL versions 5.7.28 and prior, as well as 8.0.18 and prior.
Yes, CVE-2020-2573 allows an unauthenticated attacker with network access to potentially compromise MySQL.
An attacker can exploit CVE-2020-2573 via multiple network protocols.