First published: Wed Apr 15 2020(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <8.0.19 | 8.0.19 |
MySQL | >=5.6.0<5.6.47 | |
MySQL | >=5.7.0<5.7.29 | |
MySQL | >=8.0.0<8.0.19 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
netapp active iq unified manager windows | >=7.3 | |
NetApp Active IQ Unified Manager for VMware vSphere | >=9.5 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp snapcenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2779 is considered easily exploitable and allows high privileged attackers with network access to compromise MySQL Server.
To fix CVE-2020-2779, upgrade to MySQL Server version 8.0.19 or later.
CVE-2020-2779 affects MySQL Server versions 8.0.18 and prior.
Yes, a remote attacker with high privileges can exploit CVE-2020-2779 through multiple network protocols.
CVE-2020-2779 affects the MySQL Server component, specifically related to security privileges.