First published: Wed Jan 20 2021(Updated: )
An unspecified vulnerability in Oracle MySQL Server related to the Server: Stored Procedure component could allow an authenticated attacker to cause a denial of service resulting in a high availability impact using unknown attack vectors.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <8.0.23 | 8.0.23 |
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
Oracle MySQL | >=8.0.0<=8.0.22 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
NetApp SnapCenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-2072 has a high severity rating because it can lead to a denial of service that impacts high availability.
To fix CVE-2021-2072, update your Oracle MySQL to version 8.0.23 or later.
CVE-2021-2072 affects Oracle MySQL versions prior to 8.0.23, and various versions of IBM InfoSphere Guardium and NetApp products.
No, CVE-2021-2072 requires an authenticated attacker to exploit the vulnerability.
CVE-2021-2072 is related to the Server: Stored Procedure component of Oracle MySQL Server.