First published: Wed Apr 15 2020(Updated: )
A flaw was found in the mysql-connector-java package. A complicated attack against the mysql Connector/J allows attackers on the local network to interfere with a user's connection and insert unauthorized SQL commands in MySQL Connectors and other products.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mysql-connector-java | ||
redhat/mysql-connector-java | <8.0.15 | 8.0.15 |
redhat/mysql-connector-java | <5.1.49 | 5.1.49 |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data | <=2.2 | |
IBM Watson Query with Cloud Pak for Data | <=2.1 | |
IBM Watson Query with Cloud Pak for Data | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 | |
Oracle MySQL Connector/J | >=5.1.0<=5.1.48 | |
Oracle MySQL Connector/J | >=8.0.0<=8.0.14 | |
Red Hat Fedora | =32 | |
Red Hat Fedora | =33 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2875 is considered a difficult to exploit vulnerability that allows unauthenticated attackers with network access to compromise MySQL Connectors.
To fix CVE-2020-2875, update MySQL Connector/J to version 8.0.15 or later, or 5.1.49 or later.
CVE-2020-2875 affects MySQL Connector/J versions 8.0.14 and prior, and 5.1.48 and prior.
CVE-2020-2875 involves the MySQL Connectors product of Oracle MySQL specifically the Connector/J component.
Yes, CVE-2020-2875 can be exploited remotely if the attacker has network access via multiple protocols.