Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: CVE-2016-2047: Security patch for mysql55 ((Multiple Advisories))

Back to Search

Amazon Linux AMI: CVE-2016-2047: Security patch for mysql55 ((Multiple Advisories))

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
01/27/2016
Created
07/25/2018
Added
05/18/2016
Modified
05/07/2019

Description

The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."

Solution(s)

  • amazon-linux-upgrade-mysql55
  • amazon-linux-upgrade-mysql56

References

  • amazon-linux-upgrade-mysql55
  • amazon-linux-upgrade-mysql56

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;