Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.33 and earlier and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.
References
Link | Resource |
---|---|
http://osvdb.org/102070 | Broken Link |
http://rhn.redhat.com/errata/RHSA-2014-0173.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2014-0186.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2014-0189.html | Third Party Advisory |
http://secunia.com/advisories/56491 | Not Applicable |
http://secunia.com/advisories/56580 | Not Applicable |
http://security.gentoo.org/glsa/glsa-201409-04.xml | Third Party Advisory |
http://ubuntu.com/usn/usn-2086-1 | Third Party Advisory |
http://www.debian.org/security/2014/dsa-2848 | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html | Vendor Advisory |
http://www.securityfocus.com/bid/64758 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/64891 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
26 Aug 2022, 16:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.31:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.32:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* |
References | (BID) http://www.securityfocus.com/bid/64758 - Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/64891 - Third Party Advisory, VDB Entry | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0173.html - Third Party Advisory | |
References | (UBUNTU) http://ubuntu.com/usn/usn-2086-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/56491 - Not Applicable | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0186.html - Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Vendor Advisory | |
References | (DEBIAN) http://www.debian.org/security/2014/dsa-2848 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0189.html - Third Party Advisory | |
References | (OSVDB) http://osvdb.org/102070 - Broken Link | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201409-04.xml - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/56580 - Not Applicable |
Information
Published : 2014-01-15 16:08
Updated : 2024-02-04 18:16
NVD link : CVE-2013-5891
Mitre link : CVE-2013-5891
CVE.ORG link : CVE-2013-5891
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_workstation
- enterprise_linux_desktop
oracle
- mysql
canonical
- ubuntu_linux
mariadb
- mariadb
debian
- debian_linux
CWE