Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RBR.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2014-0522.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2014-0536.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2014-0537.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2014-0702.html | Third Party Advisory |
http://security.gentoo.org/glsa/glsa-201409-04.xml | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html | Vendor Advisory |
http://www.securityfocus.com/bid/66896 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
19 Jul 2022, 16:14
Type | Values Removed | Values Added |
---|---|---|
References | (BID) http://www.securityfocus.com/bid/66896 - Third Party Advisory, VDB Entry | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0536.html - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0522.html - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0702.html - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0537.html - Third Party Advisory | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201409-04.xml - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : unknown |
CPE | cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.35:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.31:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.32:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.34:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.33:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* |
Information
Published : 2014-04-16 02:55
Updated : 2024-02-04 18:35
NVD link : CVE-2014-2436
Mitre link : CVE-2014-2436
CVE.ORG link : CVE-2014-2436
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_desktop
oracle
- mysql
- solaris
mariadb
- mariadb
CWE