Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
Configuration 5 (hide)
| 
 | 
Configuration 6 (hide)
| 
 | 
History
                    21 Nov 2024, 04:41
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html - Mailing List, Third Party Advisory | |
| References | () http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html - Third Party Advisory, VDB Entry | |
| References | () http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2019:2484 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2019:2511 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2019:3708 - Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/ - | |
| References | () https://seclists.org/bugtraq/2019/Aug/1 - Issue Tracking, Mailing List, Third Party Advisory | |
| References | () https://support.f5.com/csp/article/K03444640 - Third Party Advisory | |
| References | () https://support.f5.com/csp/article/K03444640?utm_source=f5support&%3Butm_medium=RSS - | |
| References | () https://usn.ubuntu.com/4070-1/ - Third Party Advisory | |
| References | () https://usn.ubuntu.com/4070-2/ - Third Party Advisory | |
| References | () https://usn.ubuntu.com/4070-3/ - Third Party Advisory | 
04 Aug 2022, 19:36
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:8.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:8.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* | |
| References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html - Mailing List, Third Party Advisory | |
| References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2511 - Third Party Advisory | |
| References | (MISC) http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html - Third Party Advisory, VDB Entry | |
| References | (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/1 - Issue Tracking, Mailing List, Third Party Advisory | |
| References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2484 - Third Party Advisory | |
| References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/ - Mailing List, Third Party Advisory | |
| References | (UBUNTU) https://usn.ubuntu.com/4070-2/ - Third Party Advisory | |
| References | (CONFIRM) https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS - Third Party Advisory | |
| References | (UBUNTU) https://usn.ubuntu.com/4070-3/ - Third Party Advisory | |
| References | (CONFIRM) https://support.f5.com/csp/article/K03444640 - Third Party Advisory | |
| References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/ - Mailing List, Third Party Advisory | |
| References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:3708 - Third Party Advisory | 
Information
                Published : 2019-07-23 23:15
Updated : 2024-11-21 04:41
NVD link : CVE-2019-2740
Mitre link : CVE-2019-2740
CVE.ORG link : CVE-2019-2740
JSON object : View
Products Affected
                oracle
- mysql
redhat
- enterprise_linux_desktop
- enterprise_linux_server_tus
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux_server_aus
opensuse
- leap
canonical
- ubuntu_linux
fedoraproject
- fedora
mariadb
- mariadb
CWE
                