ID CVE-2019-2481
Summary Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
References
Vulnerable Configurations
  • Oracle MySQL 5.6.0
    cpe:2.3:a:oracle:mysql:5.6.0
  • Oracle MySQL 5.6.0 Enterprise Edition
    cpe:2.3:a:oracle:mysql:5.6.0:-:-:-:enterprise
  • Oracle MySQL 5.6.1
    cpe:2.3:a:oracle:mysql:5.6.1
  • Oracle MySQL 5.6.2
    cpe:2.3:a:oracle:mysql:5.6.2
  • Oracle MySQL 5.6.3
    cpe:2.3:a:oracle:mysql:5.6.3
  • Oracle MySQL 5.6.4
    cpe:2.3:a:oracle:mysql:5.6.4
  • Oracle MySQL 5.6.5
    cpe:2.3:a:oracle:mysql:5.6.5
  • Oracle MySQL 5.6.6
    cpe:2.3:a:oracle:mysql:5.6.6
  • Oracle MySQL 5.6.7
    cpe:2.3:a:oracle:mysql:5.6.7
  • Oracle MySQL 5.6.8
    cpe:2.3:a:oracle:mysql:5.6.8
  • Oracle MySQL 5.6.9
    cpe:2.3:a:oracle:mysql:5.6.9
  • Oracle MySQL 5.6.10
    cpe:2.3:a:oracle:mysql:5.6.10
  • Oracle MySQL 5.6.11
    cpe:2.3:a:oracle:mysql:5.6.11
  • Oracle MySQL 5.6.12
    cpe:2.3:a:oracle:mysql:5.6.12
  • Oracle MySQL 5.6.13
    cpe:2.3:a:oracle:mysql:5.6.13
  • Oracle MySQL 5.6.14
    cpe:2.3:a:oracle:mysql:5.6.14
  • Oracle MySQL 5.6.15
    cpe:2.3:a:oracle:mysql:5.6.15
  • Oracle MySQL 5.6.16
    cpe:2.3:a:oracle:mysql:5.6.16
  • Oracle MySQL 5.6.17
    cpe:2.3:a:oracle:mysql:5.6.17
  • Oracle MySQL 5.6.18
    cpe:2.3:a:oracle:mysql:5.6.18
  • Oracle MySQL 5.6.19
    cpe:2.3:a:oracle:mysql:5.6.19
  • Oracle MySQL 5.6.20
    cpe:2.3:a:oracle:mysql:5.6.20
  • Oracle MySQL 5.6.21
    cpe:2.3:a:oracle:mysql:5.6.21
  • Oracle MySQL 5.6.22
    cpe:2.3:a:oracle:mysql:5.6.22
  • Oracle MySQL 5.6.23
    cpe:2.3:a:oracle:mysql:5.6.23
  • Oracle MySQL 5.6.24
    cpe:2.3:a:oracle:mysql:5.6.24
  • Oracle MySQL 5.6.25
    cpe:2.3:a:oracle:mysql:5.6.25
  • Oracle MySQL 5.6.26
    cpe:2.3:a:oracle:mysql:5.6.26
  • Oracle MySQL 5.6.27
    cpe:2.3:a:oracle:mysql:5.6.27
  • Oracle MySQL 5.6.28
    cpe:2.3:a:oracle:mysql:5.6.28
  • Oracle MySQL 5.6.29
    cpe:2.3:a:oracle:mysql:5.6.29
  • Oracle MySQL 5.6.30
    cpe:2.3:a:oracle:mysql:5.6.30
  • Oracle MySQL 5.6.31
    cpe:2.3:a:oracle:mysql:5.6.31
  • Oracle MySQL 5.6.32
    cpe:2.3:a:oracle:mysql:5.6.32
  • Oracle MySQL 5.6.33
    cpe:2.3:a:oracle:mysql:5.6.33
  • Oracle MySQL 5.6.34
    cpe:2.3:a:oracle:mysql:5.6.34
  • Oracle MySQL 5.6.35
    cpe:2.3:a:oracle:mysql:5.6.35
  • Oracle MySQL 5.6.36
    cpe:2.3:a:oracle:mysql:5.6.36
  • Oracle MySQL 5.6.37
    cpe:2.3:a:oracle:mysql:5.6.37
  • Oracle MySQL 5.6.38
    cpe:2.3:a:oracle:mysql:5.6.38
  • Oracle MySQL 5.6.39
    cpe:2.3:a:oracle:mysql:5.6.39
  • Oracle MySQL 5.6.40
    cpe:2.3:a:oracle:mysql:5.6.40
  • Oracle MySQL 5.6.41
    cpe:2.3:a:oracle:mysql:5.6.41
  • Oracle MySQL 5.6.42
    cpe:2.3:a:oracle:mysql:5.6.42
  • Oracle MySQL 5.7.0
    cpe:2.3:a:oracle:mysql:5.7.0
  • Oracle MySQL 5.7.0 Community Edition
    cpe:2.3:a:oracle:mysql:5.7.0:-:-:-:community
  • Oracle MySQL 5.7.0 Enterprise Edition
    cpe:2.3:a:oracle:mysql:5.7.0:-:-:-:enterprise
  • Oracle MySQL 5.7.1
    cpe:2.3:a:oracle:mysql:5.7.1
  • Oracle MySQL 5.7.2
    cpe:2.3:a:oracle:mysql:5.7.2
  • Oracle MySQL 5.7.3
    cpe:2.3:a:oracle:mysql:5.7.3
  • Oracle MySQL 5.7.4
    cpe:2.3:a:oracle:mysql:5.7.4
  • Oracle MySQL 5.7.5
    cpe:2.3:a:oracle:mysql:5.7.5
  • Oracle MySQL 5.7.6
    cpe:2.3:a:oracle:mysql:5.7.6
  • Oracle MySQL 5.7.7
    cpe:2.3:a:oracle:mysql:5.7.7
  • Oracle MySQL 5.7.8
    cpe:2.3:a:oracle:mysql:5.7.8
  • Oracle MySQL 5.7.9
    cpe:2.3:a:oracle:mysql:5.7.9
  • Oracle MySQL 5.7.10
    cpe:2.3:a:oracle:mysql:5.7.10
  • Oracle MySQL 5.7.11
    cpe:2.3:a:oracle:mysql:5.7.11
  • Oracle MySQL 5.7.12
    cpe:2.3:a:oracle:mysql:5.7.12
  • Oracle MySQL 5.7.13
    cpe:2.3:a:oracle:mysql:5.7.13
  • Oracle MySQL 5.7.14
    cpe:2.3:a:oracle:mysql:5.7.14
  • Oracle MySQL 5.7.15
    cpe:2.3:a:oracle:mysql:5.7.15
  • Oracle MySQL 5.7.16
    cpe:2.3:a:oracle:mysql:5.7.16
  • Oracle MySQL 5.7.17
    cpe:2.3:a:oracle:mysql:5.7.17
  • Oracle MySQL 5.7.18
    cpe:2.3:a:oracle:mysql:5.7.18
  • Oracle MySQL 5.7.19
    cpe:2.3:a:oracle:mysql:5.7.19
  • Oracle MySQL 5.7.20
    cpe:2.3:a:oracle:mysql:5.7.20
  • Oracle MySQL 5.7.21
    cpe:2.3:a:oracle:mysql:5.7.21
  • Oracle MySQL 5.7.22
    cpe:2.3:a:oracle:mysql:5.7.22
  • Oracle MySQL 5.7.23
    cpe:2.3:a:oracle:mysql:5.7.23
  • Oracle MySQL 5.7.24
    cpe:2.3:a:oracle:mysql:5.7.24
  • Oracle MySQL 8.0.0
    cpe:2.3:a:oracle:mysql:8.0.0
  • Oracle MySQL 8.0.1
    cpe:2.3:a:oracle:mysql:8.0.1
  • Oracle MySQL 8.0.2
    cpe:2.3:a:oracle:mysql:8.0.2
  • Oracle MySQL 8.0.3
    cpe:2.3:a:oracle:mysql:8.0.3
  • Oracle MySQL 8.0.4
    cpe:2.3:a:oracle:mysql:8.0.4
  • Oracle MySQL 8.0.11
    cpe:2.3:a:oracle:mysql:8.0.11
  • Oracle MySQL 8.0.12
    cpe:2.3:a:oracle:mysql:8.0.12
  • Oracle MySQL 8.0.13
    cpe:2.3:a:oracle:mysql:8.0.13
  • Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:16.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.04 LTS Edition
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.10
    cpe:2.3:o:canonical:ubuntu_linux:18.10
  • cpe:2.3:a:netapp:oncommand_workflow_automation
    cpe:2.3:a:netapp:oncommand_workflow_automation
  • cpe:2.3:a:netapp:snapcenter
    cpe:2.3:a:netapp:snapcenter
  • cpe:2.3:a:netapp:storage_automation_store
    cpe:2.3:a:netapp:storage_automation_store
CVSS
Base: 4.0
Impact:
Exploitability:
CWE CWE-284
CAPEC
  • Embedding Scripts within Scripts
    An attack of this type exploits a programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts. The attacker leverages this capability to execute scripts to execute his/her own script by embedding it within other scripts that the target software is likely to execute. The attacker must have the ability to inject script into script that is likely to be executed. If this is done, then the attacker can potentially launch a variety of probes and attacks against the web server's local environment, in many cases the so-called DMZ, back end resources the web server can communicate with, and other hosts. With the proliferation of intermediaries, such as Web App Firewalls, network devices, and even printers having JVMs and Web servers, there are many locales where an attacker can inject malicious scripts. Since this attack pattern defines scripts within scripts, there are likely privileges to execute said attack on the host. Of course, these attacks are not solely limited to the server side, client side scripts like Ajax and client side JavaScript can contain malicious scripts as well. In general all that is required is for there to be sufficient privileges to execute a script, but not protected against writing.
  • Signature Spoofing by Key Theft
    An attacker obtains an authoritative or reputable signer's private signature key by theft and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-138.NASL
    description This update for mysql-community-server to version 5.6.43 fixes the following issues : Security issues fixed : - CVE-2019-2534, CVE-2019-2529, CVE-2019-2482, CVE-2019-2455, CVE-2019-2503, CVE-2019-2537, CVE-2019-2481, CVE-2019-2507, CVE-2019-2531, CVE-2018-0734 (boo#1113652, boo#1122198)
    last seen 2019-02-21
    modified 2019-02-06
    plugin id 121608
    published 2019-02-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121608
    title openSUSE Security Update : mysql-community-server (openSUSE-2019-138)
  • NASL family Databases
    NASL id MYSQL_5_7_25.NASL
    description The version of MySQL running on the remote host is 5.7.x prior to 5.7.25. It is, therefore, affected by multiple vulnerabilities, including three of the top vulnerabilities below, as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability in MySQL in the 'Server: Replication' subcomponent could allow an low privileged attacker with network access via multiple protocols to gain unauthorized access critical data or complete access to all MySQL server data. (CVE-2019-2534) - An unspecified vulnerability in MySQL in the 'Server: Optimizer' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2529) - An unspecified vulnerability in MySQL in the 'Server: PS' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2482) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121228
    published 2019-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121228
    title MySQL 5.7.x < 5.7.25 Multiple Vulnerabilities (Jan 2019 CPU)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3867-1.NASL
    description Multiple security issues were discovered in MySQL and this update includes a new upstream MySQL version to fix these issues. Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 18.10 have been updated to MySQL 5.7.25. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-25.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-507280 1.html. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-24
    plugin id 121346
    published 2019-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121346
    title Ubuntu 16.04 LTS / 18.04 LTS / 18.10 : mysql-5.7 vulnerabilities (USN-3867-1)
  • NASL family Databases
    NASL id MYSQL_8_0_14.NASL
    description The version of MySQL running on the remote host is 8.0.x prior to 8.0.14. It is, therefore, affected by multiple vulnerabilities, including three of the top vulnerabilities below, as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability in MySQL in the 'Server: Replication' subcomponent could allow an low privileged attacker with network access via multiple protocols to gain unauthorized access critical data or complete access to all MySQL server data. (CVE-2019-2534) - An unspecified vulnerability in MySQL in the 'Server: Optimizer' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2529) - An unspecified vulnerability in MySQL in the 'Server: PS' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2482) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121229
    published 2019-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121229
    title MySQL 8.0.x < 8.0.14 Multiple Vulnerabilities (Jan 2019 CPU)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_D3D02D3A224211E9B95CB499BAEBFEAF.NASL
    description Oracle reports : Please reference CVE/URL list for details Not all listed CVE's are present in all versions/flavors
    last seen 2019-01-29
    modified 2019-01-28
    plugin id 121406
    published 2019-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121406
    title FreeBSD : MySQL -- multiple vulnerabilities (d3d02d3a-2242-11e9-b95c-b499baebfeaf)
  • NASL family Databases
    NASL id MYSQL_5_6_43.NASL
    description The version of MySQL running on the remote host is 5.6.x prior to 5.6.43. It is, therefore, affected by multiple vulnerabilities, including three of the top vulnerabilities below, as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability in MySQL in the 'Server: Replication' subcomponent could allow an low privileged attacker with network access via multiple protocols to gain unauthorized access critical data or complete access to all MySQL server data. (CVE-2019-2534) - An unspecified vulnerability in MySQL in the 'Server: Optimizer' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2529) - An unspecified vulnerability in MySQL in the 'Server: PS' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2482) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121227
    published 2019-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121227
    title MySQL 5.6.x < 5.6.43 Multiple Vulnerabilities (Jan 2019 CPU)
redhat via4
advisories
bugzilla
id 1088197
title CVE-2014-2440 mysql: unspecified vulnerability related to Client (CPU April 2014)
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 7 Client is installed
      oval oval:com.redhat.rhba:tst:20150364001
    • comment Red Hat Enterprise Linux 7 Server is installed
      oval oval:com.redhat.rhba:tst:20150364002
    • comment Red Hat Enterprise Linux 7 Workstation is installed
      oval oval:com.redhat.rhba:tst:20150364003
    • comment Red Hat Enterprise Linux 7 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20150364004
  • OR
    • AND
      • comment mariadb is earlier than 1:5.5.37-1.el7_0
        oval oval:com.redhat.rhsa:tst:20140702005
      • comment mariadb is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20140702006
    • AND
      • comment mariadb-bench is earlier than 1:5.5.37-1.el7_0
        oval oval:com.redhat.rhsa:tst:20140702011
      • comment mariadb-bench is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20140702012
    • AND
      • comment mariadb-devel is earlier than 1:5.5.37-1.el7_0
        oval oval:com.redhat.rhsa:tst:20140702017
      • comment mariadb-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20140702018
    • AND
      • comment mariadb-embedded is earlier than 1:5.5.37-1.el7_0
        oval oval:com.redhat.rhsa:tst:20140702013
      • comment mariadb-embedded is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20140702014
    • AND
      • comment mariadb-embedded-devel is earlier than 1:5.5.37-1.el7_0
        oval oval:com.redhat.rhsa:tst:20140702009
      • comment mariadb-embedded-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20140702010
    • AND
      • comment mariadb-libs is earlier than 1:5.5.37-1.el7_0
        oval oval:com.redhat.rhsa:tst:20140702007
      • comment mariadb-libs is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20140702008
    • AND
      • comment mariadb-server is earlier than 1:5.5.37-1.el7_0
        oval oval:com.redhat.rhsa:tst:20140702019
      • comment mariadb-server is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20140702020
    • AND
      • comment mariadb-test is earlier than 1:5.5.37-1.el7_0
        oval oval:com.redhat.rhsa:tst:20140702015
      • comment mariadb-test is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20140702016
rhsa
id RHSA-2014:0702
released 2014-06-10
severity Moderate
title RHSA-2014:0702: mariadb security update (Moderate)
rpms
  • mariadb-1:5.5.37-1.el7_0
  • mariadb-bench-1:5.5.37-1.el7_0
  • mariadb-devel-1:5.5.37-1.el7_0
  • mariadb-embedded-1:5.5.37-1.el7_0
  • mariadb-embedded-devel-1:5.5.37-1.el7_0
  • mariadb-libs-1:5.5.37-1.el7_0
  • mariadb-server-1:5.5.37-1.el7_0
  • mariadb-test-1:5.5.37-1.el7_0
refmap via4
bid 106619
confirm
ubuntu USN-3867-1
Last major update 16-01-2019 - 14:30
Published 16-01-2019 - 14:30
Last modified 25-04-2019 - 08:42
Back to Top