First published: Tue Apr 18 2023(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.40 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Mysql Server | >=5.7.0<=5.7.40 | |
Oracle Mysql Server | >=8.0.0<=8.0.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability is in the Server: Connection Handling component of Oracle MySQL.
Versions 5.7.40 and prior, and 8.0.31 and prior are affected.
CVE-2023-21963 has a severity value of 2.7, which is classified as low.
An attacker with high privileges and network access via multiple protocols can easily exploit this vulnerability.
You can find more information about CVE-2023-21963 on the following references: [NetApp Security Advisory](https://security.netapp.com/advisory/ntap-20230427-0007/) and [Oracle Security Alerts](https://www.oracle.com/security-alerts/cpuapr2023.html)