vulnerability

Oracle Solaris 11: CVE-2017-3320: Vulnerability in MySQL

Severity
4
CVSS
(AV:N/AC:M/Au:S/C:P/I:N/A:N)
Published
Jan 27, 2017
Added
May 29, 2017
Modified
Feb 1, 2022

Description

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS v3.0 Base Score 2.4 (Confidentiality impacts).

Solution(s)

oracle-solaris-11-3-upgrade-database-mysql-55-5-5-54-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-55-client-5-5-54-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-55-library-5-5-54-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-55-tests-5-5-54-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-56-5-6-35-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-56-client-5-6-35-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-56-library-5-6-35-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-56-tests-5-6-35-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-57-5-7-17-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-57-client-5-7-17-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-57-embedded-5-7-17-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-57-library-5-7-17-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-57-tests-5-7-17-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-runtime-perl-512-5-12-5-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-runtime-perl-threaded-512-5-12-5-0-175-3-19-0-2-0
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.