First published: Thu Oct 18 2018(Updated: )
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. References: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3258">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3258</a> <a href="http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#CVE-2018-3258">http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#CVE-2018-3258</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL Connectors | <8.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1640615 is classified as an easily exploitable vulnerability that allows attackers with low privileges to compromise MySQL Connectors.
To mitigate the REDHAT-BUG-1640615 vulnerability, upgrade to MySQL Connectors version 8.0.13 or later.
The vulnerability REDHAT-BUG-1640615 affects all supported versions of Oracle MySQL Connectors up to 8.0.12.
The impact of REDHAT-BUG-1640615 allows an unauthorized attacker to compromise MySQL Connectors through network access.
Yes, the vulnerability REDHAT-BUG-1640615 can be exploited remotely as it allows network access via multiple protocols.