First published: Tue Oct 18 2022(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL | >=5.7.0<=5.7.36 | |
Oracle MySQL | >=8.0<=8.0.27 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
Mariadb Mariadb | >=10.2.0<10.2.42 | |
Mariadb Mariadb | >=10.3.0<10.3.33 | |
Mariadb Mariadb | >=10.4.0<10.4.23 | |
Mariadb Mariadb | >=10.5.0<10.5.14 | |
Mariadb Mariadb | >=10.6.0<10.6.6 | |
Mariadb Mariadb | >=10.7.0<10.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-21595 is medium.
The affected software of CVE-2022-21595 includes Oracle MySQL versions 5.7.36 and prior, Oracle MySQL versions 8.0.27 and prior, NetApp OnCommand Insight, NetApp OnCommand Workflow Automation, Mariadb versions 10.2.0 to 10.2.42, Mariadb versions 10.3.0 to 10.3.33, Mariadb versions 10.4.0 to 10.4.23, Mariadb versions 10.5.0 to 10.5.14, and Mariadb versions 10.6.0 to 10.6.6.
An attacker with high privileges and network access via multiple protocols can exploit CVE-2022-21595 to compromise MySQL Server.
You can find more information about CVE-2022-21595 at the following references: - NetApp Security Advisory [ntap-20221028-0013](https://security.netapp.com/advisory/ntap-20221028-0013/) - Oracle Security Alerts [CPUOct2022](https://www.oracle.com/security-alerts/cpuoct2022.html)
To fix CVE-2022-21595, it is recommended to update to the latest versions of the affected software mentioned in the description.