vulnerability
SUSE: CVE-2016-2047: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Jan 27, 2016 | May 11, 2016 | Feb 4, 2022 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jan 27, 2016
Added
May 11, 2016
Modified
Feb 4, 2022
Description
The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
Solutions
suse-upgrade-libmariadbd-develsuse-upgrade-libmariadbd19suse-upgrade-libmysql55client18suse-upgrade-libmysql55client18-32bitsuse-upgrade-libmysql55client18-x86suse-upgrade-libmysql55client_r18suse-upgrade-libmysql55client_r18-32bitsuse-upgrade-libmysql55client_r18-x86suse-upgrade-libmysqlclient-develsuse-upgrade-libmysqlclient18suse-upgrade-libmysqlclient18-32bitsuse-upgrade-libmysqlclient_r18suse-upgrade-libmysqlclient_r18-32bitsuse-upgrade-libmysqld-develsuse-upgrade-libmysqld18suse-upgrade-libmysqld19suse-upgrade-mariadbsuse-upgrade-mariadb-100-errormessagessuse-upgrade-mariadb-clientsuse-upgrade-mariadb-errormessagessuse-upgrade-mariadb-toolssuse-upgrade-mysqlsuse-upgrade-mysql-clientsuse-upgrade-mysql-tools
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.