First published: Tue Jul 16 2024(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.4.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL | <=8.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21176 is classified as a difficult to exploit vulnerability allowing a low privileged attacker to compromise MySQL Server.
To fix CVE-2024-21176, upgrade your MySQL Server to version 8.4.1 or later.
CVE-2024-21176 affects MySQL Server versions up to and including 8.4.0.
Exploitation of CVE-2024-21176 could allow an attacker with network access to gain unauthorized access to the MySQL Server.
Yes, network access via multiple protocols is required to exploit CVE-2024-21176.