First published: Wed Jan 17 2024(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mysql-8.0 | 8.0.36-3 | |
ubuntu/mysql-8.0 | <8.0.36-0ubuntu0.20.04.1 | 8.0.36-0ubuntu0.20.04.1 |
ubuntu/mysql-8.0 | <8.0.36-0ubuntu0.22.04.1 | 8.0.36-0ubuntu0.22.04.1 |
ubuntu/mysql-8.0 | <8.0.36-0ubuntu0.23.10.1 | 8.0.36-0ubuntu0.23.10.1 |
ubuntu/mysql-8.0 | <8.0.36 | 8.0.36 |
redhat/mysql | <8.0.36 | 8.0.36 |
redhat/mysql | <8.2.1 | 8.2.1 |
Oracle MySQL | >=8.0.0<=8.0.35 | |
Oracle MySQL | >=8.1.0<=8.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20964 is considered a difficult to exploit vulnerability that affects low privileged users.
To mitigate CVE-2024-20964, upgrade MySQL Server to version 8.0.36 or 8.2.1 depending on your environment.
CVE-2024-20964 affects MySQL Server versions 8.0.35 and prior, as well as 8.2.0 and prior.
A low privileged attacker with network access via multiple protocols can potentially exploit CVE-2024-20964.
There are no documented workarounds for CVE-2024-20964, so it is recommended to update to a secure version.