First published: Tue Apr 18 2023(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mysql-8.0 | <=8.0.32-1 | |
ubuntu/mysql-8.0 | <8.0.33-0ubuntu0.20.04.1 | 8.0.33-0ubuntu0.20.04.1 |
ubuntu/mysql-8.0 | <8.0.33-0ubuntu0.22.04.1 | 8.0.33-0ubuntu0.22.04.1 |
ubuntu/mysql-8.0 | <8.0.33-0ubuntu0.22.10.1 | 8.0.33-0ubuntu0.22.10.1 |
ubuntu/mysql-8.0 | <8.0.33-0ubuntu0.23.04.1 | 8.0.33-0ubuntu0.23.04.1 |
ubuntu/mysql-8.0 | <8.0.33 | 8.0.33 |
Oracle Mysql Server | >=8.0.0<=8.0.32 | |
redhat/mysql | <8.0.33 | 8.0.33 |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
Netapp Snapcenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-21962 is medium.
The affected versions of MySQL Server are 8.0.32 and prior.
An attacker with high privileges and network access via multiple protocols can exploit CVE-2023-21962 to compromise MySQL Server.
There is no specific recommended remedy available for CVE-2023-21962. It is advised to update to a non-affected version of MySQL Server.
More information about CVE-2023-21962 can be found at the following references: [Reference 1](https://www.oracle.com/security-alerts/cpuapr2023.html), [Reference 2](https://security.netapp.com/advisory/ntap-20230427-0007/), [Reference 3](https://launchpad.net/bugs/cve/CVE-2023-21962).