Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2016-2047: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2016-2047: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
01/27/2016
Created
07/25/2018
Added
05/11/2016
Modified
08/11/2021

Description

The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."

Solution(s)

  • suse-upgrade-libmysql55client18
  • suse-upgrade-libmysql55client18-32bit
  • suse-upgrade-libmysql55client18-x86
  • suse-upgrade-libmysql55client_r18
  • suse-upgrade-libmysql55client_r18-32bit
  • suse-upgrade-libmysql55client_r18-x86
  • suse-upgrade-libmysqlclient-devel
  • suse-upgrade-libmysqlclient18
  • suse-upgrade-libmysqlclient18-32bit
  • suse-upgrade-libmysqlclient_r18
  • suse-upgrade-libmysqlclient_r18-32bit
  • suse-upgrade-libmysqld-devel
  • suse-upgrade-libmysqld18
  • suse-upgrade-libmysqld19
  • suse-upgrade-mariadb
  • suse-upgrade-mariadb-100-errormessages
  • suse-upgrade-mariadb-client
  • suse-upgrade-mariadb-errormessages
  • suse-upgrade-mariadb-tools
  • suse-upgrade-mysql
  • suse-upgrade-mysql-client
  • suse-upgrade-mysql-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;