This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle MySQL Cluster. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of Data Node jobs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL Cluster |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-14771 is classified as a high severity vulnerability due to its potential for remote code execution.
To mitigate ZDI-CAN-14771, upgrade to the latest version of Oracle MySQL Cluster as recommended in Oracle's security alerts.
ZDI-CAN-14771 allows remote attackers to execute arbitrary code, potentially compromising the affected MySQL Cluster installations.
No, ZDI-CAN-14771 can be exploited without any authentication, making it particularly dangerous.
ZDI-CAN-14771 impacts Oracle MySQL Cluster, allowing for remote code execution vulnerabilities.