ID CVE-2019-2529
Summary Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
References
Vulnerable Configurations
  • Oracle MySQL 5.6.0
    cpe:2.3:a:oracle:mysql:5.6.0
  • Oracle MySQL 5.6.0 Enterprise Edition
    cpe:2.3:a:oracle:mysql:5.6.0:-:-:-:enterprise
  • Oracle MySQL 5.6.1
    cpe:2.3:a:oracle:mysql:5.6.1
  • Oracle MySQL 5.6.2
    cpe:2.3:a:oracle:mysql:5.6.2
  • Oracle MySQL 5.6.3
    cpe:2.3:a:oracle:mysql:5.6.3
  • Oracle MySQL 5.6.4
    cpe:2.3:a:oracle:mysql:5.6.4
  • Oracle MySQL 5.6.5
    cpe:2.3:a:oracle:mysql:5.6.5
  • Oracle MySQL 5.6.6
    cpe:2.3:a:oracle:mysql:5.6.6
  • Oracle MySQL 5.6.7
    cpe:2.3:a:oracle:mysql:5.6.7
  • Oracle MySQL 5.6.8
    cpe:2.3:a:oracle:mysql:5.6.8
  • Oracle MySQL 5.6.9
    cpe:2.3:a:oracle:mysql:5.6.9
  • Oracle MySQL 5.6.10
    cpe:2.3:a:oracle:mysql:5.6.10
  • Oracle MySQL 5.6.11
    cpe:2.3:a:oracle:mysql:5.6.11
  • Oracle MySQL 5.6.12
    cpe:2.3:a:oracle:mysql:5.6.12
  • Oracle MySQL 5.6.13
    cpe:2.3:a:oracle:mysql:5.6.13
  • Oracle MySQL 5.6.14
    cpe:2.3:a:oracle:mysql:5.6.14
  • Oracle MySQL 5.6.15
    cpe:2.3:a:oracle:mysql:5.6.15
  • Oracle MySQL 5.6.16
    cpe:2.3:a:oracle:mysql:5.6.16
  • Oracle MySQL 5.6.17
    cpe:2.3:a:oracle:mysql:5.6.17
  • Oracle MySQL 5.6.18
    cpe:2.3:a:oracle:mysql:5.6.18
  • Oracle MySQL 5.6.19
    cpe:2.3:a:oracle:mysql:5.6.19
  • Oracle MySQL 5.6.20
    cpe:2.3:a:oracle:mysql:5.6.20
  • Oracle MySQL 5.6.21
    cpe:2.3:a:oracle:mysql:5.6.21
  • Oracle MySQL 5.6.22
    cpe:2.3:a:oracle:mysql:5.6.22
  • Oracle MySQL 5.6.23
    cpe:2.3:a:oracle:mysql:5.6.23
  • Oracle MySQL 5.6.24
    cpe:2.3:a:oracle:mysql:5.6.24
  • Oracle MySQL 5.6.25
    cpe:2.3:a:oracle:mysql:5.6.25
  • Oracle MySQL 5.6.26
    cpe:2.3:a:oracle:mysql:5.6.26
  • Oracle MySQL 5.6.27
    cpe:2.3:a:oracle:mysql:5.6.27
  • Oracle MySQL 5.6.28
    cpe:2.3:a:oracle:mysql:5.6.28
  • Oracle MySQL 5.6.29
    cpe:2.3:a:oracle:mysql:5.6.29
  • Oracle MySQL 5.6.30
    cpe:2.3:a:oracle:mysql:5.6.30
  • Oracle MySQL 5.6.31
    cpe:2.3:a:oracle:mysql:5.6.31
  • Oracle MySQL 5.6.32
    cpe:2.3:a:oracle:mysql:5.6.32
  • Oracle MySQL 5.6.33
    cpe:2.3:a:oracle:mysql:5.6.33
  • Oracle MySQL 5.6.34
    cpe:2.3:a:oracle:mysql:5.6.34
  • Oracle MySQL 5.6.35
    cpe:2.3:a:oracle:mysql:5.6.35
  • Oracle MySQL 5.6.36
    cpe:2.3:a:oracle:mysql:5.6.36
  • Oracle MySQL 5.6.37
    cpe:2.3:a:oracle:mysql:5.6.37
  • Oracle MySQL 5.6.38
    cpe:2.3:a:oracle:mysql:5.6.38
  • Oracle MySQL 5.6.39
    cpe:2.3:a:oracle:mysql:5.6.39
  • Oracle MySQL 5.6.40
    cpe:2.3:a:oracle:mysql:5.6.40
  • Oracle MySQL 5.6.41
    cpe:2.3:a:oracle:mysql:5.6.41
  • Oracle MySQL 5.6.42
    cpe:2.3:a:oracle:mysql:5.6.42
  • Oracle MySQL 5.7.0
    cpe:2.3:a:oracle:mysql:5.7.0
  • Oracle MySQL 5.7.0 Community Edition
    cpe:2.3:a:oracle:mysql:5.7.0:-:-:-:community
  • Oracle MySQL 5.7.0 Enterprise Edition
    cpe:2.3:a:oracle:mysql:5.7.0:-:-:-:enterprise
  • Oracle MySQL 5.7.1
    cpe:2.3:a:oracle:mysql:5.7.1
  • Oracle MySQL 5.7.2
    cpe:2.3:a:oracle:mysql:5.7.2
  • Oracle MySQL 5.7.3
    cpe:2.3:a:oracle:mysql:5.7.3
  • Oracle MySQL 5.7.4
    cpe:2.3:a:oracle:mysql:5.7.4
  • Oracle MySQL 5.7.5
    cpe:2.3:a:oracle:mysql:5.7.5
  • Oracle MySQL 5.7.6
    cpe:2.3:a:oracle:mysql:5.7.6
  • Oracle MySQL 5.7.7
    cpe:2.3:a:oracle:mysql:5.7.7
  • Oracle MySQL 5.7.8
    cpe:2.3:a:oracle:mysql:5.7.8
  • Oracle MySQL 5.7.9
    cpe:2.3:a:oracle:mysql:5.7.9
  • Oracle MySQL 5.7.10
    cpe:2.3:a:oracle:mysql:5.7.10
  • Oracle MySQL 5.7.11
    cpe:2.3:a:oracle:mysql:5.7.11
  • Oracle MySQL 5.7.12
    cpe:2.3:a:oracle:mysql:5.7.12
  • Oracle MySQL 5.7.13
    cpe:2.3:a:oracle:mysql:5.7.13
  • Oracle MySQL 5.7.14
    cpe:2.3:a:oracle:mysql:5.7.14
  • Oracle MySQL 5.7.15
    cpe:2.3:a:oracle:mysql:5.7.15
  • Oracle MySQL 5.7.16
    cpe:2.3:a:oracle:mysql:5.7.16
  • Oracle MySQL 5.7.17
    cpe:2.3:a:oracle:mysql:5.7.17
  • Oracle MySQL 5.7.18
    cpe:2.3:a:oracle:mysql:5.7.18
  • Oracle MySQL 5.7.19
    cpe:2.3:a:oracle:mysql:5.7.19
  • Oracle MySQL 5.7.20
    cpe:2.3:a:oracle:mysql:5.7.20
  • Oracle MySQL 5.7.21
    cpe:2.3:a:oracle:mysql:5.7.21
  • Oracle MySQL 5.7.22
    cpe:2.3:a:oracle:mysql:5.7.22
  • Oracle MySQL 5.7.23
    cpe:2.3:a:oracle:mysql:5.7.23
  • Oracle MySQL 5.7.24
    cpe:2.3:a:oracle:mysql:5.7.24
  • Oracle MySQL 8.0.0
    cpe:2.3:a:oracle:mysql:8.0.0
  • Oracle MySQL 8.0.1
    cpe:2.3:a:oracle:mysql:8.0.1
  • Oracle MySQL 8.0.2
    cpe:2.3:a:oracle:mysql:8.0.2
  • Oracle MySQL 8.0.3
    cpe:2.3:a:oracle:mysql:8.0.3
  • Oracle MySQL 8.0.4
    cpe:2.3:a:oracle:mysql:8.0.4
  • Oracle MySQL 8.0.11
    cpe:2.3:a:oracle:mysql:8.0.11
  • Oracle MySQL 8.0.12
    cpe:2.3:a:oracle:mysql:8.0.12
  • Oracle MySQL 8.0.13
    cpe:2.3:a:oracle:mysql:8.0.13
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:16.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.04 LTS Edition
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.10
    cpe:2.3:o:canonical:ubuntu_linux:18.10
  • cpe:2.3:a:netapp:oncommand_workflow_automation
    cpe:2.3:a:netapp:oncommand_workflow_automation
  • cpe:2.3:a:netapp:snapcenter
    cpe:2.3:a:netapp:snapcenter
  • cpe:2.3:a:netapp:storage_automation_store
    cpe:2.3:a:netapp:storage_automation_store
CVSS
Base: 4.0
Impact:
Exploitability:
CWE CWE-284
CAPEC
  • Embedding Scripts within Scripts
    An attack of this type exploits a programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts. The attacker leverages this capability to execute scripts to execute his/her own script by embedding it within other scripts that the target software is likely to execute. The attacker must have the ability to inject script into script that is likely to be executed. If this is done, then the attacker can potentially launch a variety of probes and attacks against the web server's local environment, in many cases the so-called DMZ, back end resources the web server can communicate with, and other hosts. With the proliferation of intermediaries, such as Web App Firewalls, network devices, and even printers having JVMs and Web servers, there are many locales where an attacker can inject malicious scripts. Since this attack pattern defines scripts within scripts, there are likely privileges to execute said attack on the host. Of course, these attacks are not solely limited to the server side, client side scripts like Ajax and client side JavaScript can contain malicious scripts as well. In general all that is required is for there to be sufficient privileges to execute a script, but not protected against writing.
  • Signature Spoofing by Key Theft
    An attacker obtains an authoritative or reputable signer's private signature key by theft and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
nessus via4
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1655.NASL
    description Several issues have been discovered in the MariaDB database server. The vulnerabilities are addressed by upgrading MariaDB to the new upstream version 10.0.38. Please see the MariaDB 10.0 Release Notes for further details : https://mariadb.com/kb/en/mariadb/mariadb-10038-release-notes/ For Debian 8 'Jessie', these problems have been fixed in version 10.0.38-0+deb8u1. We recommend that you upgrade your mariadb-10.0 packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-04
    plugin id 121552
    published 2019-02-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121552
    title Debian DLA-1655-1 : mariadb-10.0 security update
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-138.NASL
    description This update for mysql-community-server to version 5.6.43 fixes the following issues : Security issues fixed : - CVE-2019-2534, CVE-2019-2529, CVE-2019-2482, CVE-2019-2455, CVE-2019-2503, CVE-2019-2537, CVE-2019-2481, CVE-2019-2507, CVE-2019-2531, CVE-2018-0734 (boo#1113652, boo#1122198)
    last seen 2019-02-21
    modified 2019-02-06
    plugin id 121608
    published 2019-02-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121608
    title openSUSE Security Update : mysql-community-server (openSUSE-2019-138)
  • NASL family Databases
    NASL id MYSQL_5_7_25.NASL
    description The version of MySQL running on the remote host is 5.7.x prior to 5.7.25. It is, therefore, affected by multiple vulnerabilities, including three of the top vulnerabilities below, as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability in MySQL in the 'Server: Replication' subcomponent could allow an low privileged attacker with network access via multiple protocols to gain unauthorized access critical data or complete access to all MySQL server data. (CVE-2019-2534) - An unspecified vulnerability in MySQL in the 'Server: Optimizer' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2529) - An unspecified vulnerability in MySQL in the 'Server: PS' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2482) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121228
    published 2019-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121228
    title MySQL 5.7.x < 5.7.25 Multiple Vulnerabilities (Jan 2019 CPU)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3867-1.NASL
    description Multiple security issues were discovered in MySQL and this update includes a new upstream MySQL version to fix these issues. Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 18.10 have been updated to MySQL 5.7.25. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-25.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-507280 1.html. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-24
    plugin id 121346
    published 2019-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121346
    title Ubuntu 16.04 LTS / 18.04 LTS / 18.10 : mysql-5.7 vulnerabilities (USN-3867-1)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2019-032-01.NASL
    description New mariadb packages are available for Slackware 14.1 and 14.2 to fix security issues.
    last seen 2019-02-21
    modified 2019-02-04
    plugin id 121567
    published 2019-02-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121567
    title Slackware 14.1 / 14.2 : mariadb (SSA:2019-032-01)
  • NASL family Databases
    NASL id MYSQL_8_0_14.NASL
    description The version of MySQL running on the remote host is 8.0.x prior to 8.0.14. It is, therefore, affected by multiple vulnerabilities, including three of the top vulnerabilities below, as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability in MySQL in the 'Server: Replication' subcomponent could allow an low privileged attacker with network access via multiple protocols to gain unauthorized access critical data or complete access to all MySQL server data. (CVE-2019-2534) - An unspecified vulnerability in MySQL in the 'Server: Optimizer' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2529) - An unspecified vulnerability in MySQL in the 'Server: PS' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2482) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121229
    published 2019-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121229
    title MySQL 8.0.x < 8.0.14 Multiple Vulnerabilities (Jan 2019 CPU)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_D3D02D3A224211E9B95CB499BAEBFEAF.NASL
    description Oracle reports : Please reference CVE/URL list for details Not all listed CVE's are present in all versions/flavors
    last seen 2019-01-29
    modified 2019-01-28
    plugin id 121406
    published 2019-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121406
    title FreeBSD : MySQL -- multiple vulnerabilities (d3d02d3a-2242-11e9-b95c-b499baebfeaf)
  • NASL family Databases
    NASL id MYSQL_5_6_43.NASL
    description The version of MySQL running on the remote host is 5.6.x prior to 5.6.43. It is, therefore, affected by multiple vulnerabilities, including three of the top vulnerabilities below, as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability in MySQL in the 'Server: Replication' subcomponent could allow an low privileged attacker with network access via multiple protocols to gain unauthorized access critical data or complete access to all MySQL server data. (CVE-2019-2534) - An unspecified vulnerability in MySQL in the 'Server: Optimizer' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2529) - An unspecified vulnerability in MySQL in the 'Server: PS' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2482) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121227
    published 2019-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121227
    title MySQL 5.6.x < 5.6.43 Multiple Vulnerabilities (Jan 2019 CPU)
refmap via4
bid 106619
confirm
mlist [debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update
ubuntu USN-3867-1
Last major update 16-01-2019 - 14:30
Published 16-01-2019 - 14:30
Last modified 25-04-2019 - 08:42
Back to Top