Bug 1851022 (CVE-2020-2933)

Summary: CVE-2020-2933 mysql-connector-java: allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors which could result in unauthorized partial DoS
Product: [Other] Security Response Reporter: Michael Kaplan <mkaplan>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: aboyko, aileenc, akoufoud, alazarot, almorale, anstephe, asoldano, atangrin, avibelli, bbaranow, bgeorges, bibryam, bmaxwell, brian.stansberry, ccranfor, cdewolf, chazlett, clement.escoffier, cmiranda, dandread, darran.lofthouse, databases-maint, dhanak, dkreling, dosoudil, drieden, drosa, etirelli, fjuma, ganandan, ggaughan, gmalinko, gmorling, gsmet, gvarsami, hhorak, ibek, istudens, ivassile, iweiss, janstey, java-sig-commits, jawilson, jbalunas, jcoleman, jjanco, jmartisk, jochrist, jolee, jpallich, jpechane, jperkins, jrokos, jschatte, jstastny, jwon, kconner, krathod, kverlaen, kwills, ldimaggi, lgao, lthon, manderse, mmuzila, mnovotny, mosmerov, mschorm, msochure, msvehla, mszynkie, nwallace, odubaj, olubyans, pantinor, pcongius, pdelbell, pesilva, pgallagh, pjindal, pmackay, probinso, psotirop, puntogil, rguimara, rrajasek, rruss, rstancel, rstepani, rsvoboda, rsynek, rwagner, sausingh, sbiarozk, sdaley, sdouglas, smaestri, steve.traylen, tcunning, tkirby, tom.jenkinson, tqvarnst, xjakub
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mysql-connector-java 5.1.49 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the mysql-connector-java package. A complicated attack against the mysql Connector/J allows attackers on the local network to interfere with a user's connection, causing a denial of service of the MySQL Connectors.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-11-05 20:21:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1851024    
Bug Blocks: 1851025    

Description Michael Kaplan 2020-06-25 12:58:44 UTC
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 5.1.48 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors.

References:

https://www.oracle.com/security-alerts/cpuapr2020.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html 	
https://www.debian.org/security/2020/dsa-4703

Comment 1 Michael Kaplan 2020-06-25 13:00:57 UTC
Created mysql-connector-java tracking bugs for this issue:

Affects: fedora-all [bug 1851024]

Comment 4 Kunjan Rathod 2020-06-26 04:31:15 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat Enterprise Application Platform 6
 * Red Hat JBoss Data Virtualization & Services 6
 * Red Hat JBoss Fuse Service Works(FSW) 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 8 Doran Moppert 2020-07-15 06:09:18 UTC
Statement:

Red Hat Enterprise Linux customers are advised to replace the mysql-connector-java package with the mariadb-java-client, available in Red Hat Software Collections.  It can be installed this way:

  # yum-config-manager --enable rhel-server-rhscl-7-rpms

  # yum install rh-mariadb103-mariadb-java-client

Comment 9 errata-xmlrpc 2020-11-05 18:48:12 UTC
This issue has been addressed in the following products:

  RHDM 7.9.0

Via RHSA-2020:4960 https://access.redhat.com/errata/RHSA-2020:4960

Comment 10 errata-xmlrpc 2020-11-05 18:49:19 UTC
This issue has been addressed in the following products:

  RHPAM 7.9.0

Via RHSA-2020:4961 https://access.redhat.com/errata/RHSA-2020:4961

Comment 11 Product Security DevOps Team 2020-11-05 20:21:32 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-2933