Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
Configuration 5 (hide)
| 
 | 
History
                    21 Nov 2024, 04:41
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html - Mailing List, Third Party Advisory | |
| References | () http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2019:2327 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2019:2484 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2019:2511 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2019:3708 - Third Party Advisory | |
| References | () https://support.f5.com/csp/article/K32798641 - Third Party Advisory | |
| References | () https://usn.ubuntu.com/3957-1/ - Third Party Advisory | |
| References | () https://usn.ubuntu.com/3957-2/ - Third Party Advisory | |
| References | () https://usn.ubuntu.com/3957-3/ - Third Party Advisory | |
| References | () https://usn.ubuntu.com/4070-3/ - Third Party Advisory | 
05 Aug 2022, 17:11
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* | |
| References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2511 - Third Party Advisory | |
| References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html - Mailing List, Third Party Advisory | |
| References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2327 - Third Party Advisory | |
| References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2484 - Third Party Advisory | |
| References | (UBUNTU) https://usn.ubuntu.com/4070-3/ - Third Party Advisory | |
| References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:3708 - Third Party Advisory | |
| References | (UBUNTU) https://usn.ubuntu.com/3957-3/ - Third Party Advisory | |
| References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html - Mailing List, Third Party Advisory | 
Information
                Published : 2019-04-23 19:32
Updated : 2024-11-21 04:41
NVD link : CVE-2019-2627
Mitre link : CVE-2019-2627
CVE.ORG link : CVE-2019-2627
JSON object : View
Products Affected
                oracle
- mysql
opensuse
- leap
redhat
- enterprise_linux_desktop
- enterprise_linux_server_tus
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux_server_aus
canonical
- ubuntu_linux
mariadb
- mariadb
CWE
                