Bug 1414345 (CVE-2017-3256) - CVE-2017-3256 mysql: Server: Replication unspecified vulnerability (CPU Jan 2017)
Summary: CVE-2017-3256 mysql: Server: Replication unspecified vulnerability (CPU Jan ...
Status: CLOSED ERRATA
Alias: CVE-2017-3256
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20170118,repor...
Keywords: Security
Depends On: 1445517 1445518
Blocks: 1414362
TreeView+ depends on / blocked
 
Reported: 2017-01-18 10:22 UTC by Adam Mariš
Modified: 2018-04-06 12:26 UTC (History)
26 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2017-10-12 11:21:39 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:2886 normal SHIPPED_LIVE Important: rh-mysql57-mysql security and bug fix update 2017-10-12 11:53:15 UTC

Description Adam Mariš 2017-01-18 10:22:02 UTC
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication ). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. 

External References:

http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL

Comment 2 errata-xmlrpc 2017-10-12 07:57:19 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2017:2886


Note You need to log in before you can comment on or make changes to this bug.