Bug 1443363 (CVE-2017-3450) - CVE-2017-3450 mysql: Server: Memcached unspecified vulnerability (CPU Apr 2017)
Summary: CVE-2017-3450 mysql: Server: Memcached unspecified vulnerability (CPU Apr 2017)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2017-3450
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1443407 1445524 1445525 1445527 1445528
Blocks: 1443389
TreeView+ depends on / blocked
 
Reported: 2017-04-19 07:19 UTC by Adam Mariš
Modified: 2021-02-25 22:27 UTC (History)
28 users (show)

Fixed In Version: mysql 5.6.36, mysql 5.7.18
Clone Of:
Environment:
Last Closed: 2017-10-12 09:10:09 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:2787 0 normal SHIPPED_LIVE Important: rh-mysql56-mysql security and bug fix update 2017-09-21 11:42:12 UTC
Red Hat Product Errata RHSA-2017:2886 0 normal SHIPPED_LIVE Important: rh-mysql57-mysql security and bug fix update 2017-10-12 11:53:15 UTC

Description Adam Mariš 2017-04-19 07:19:54 UTC
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. 

External References:

http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL

Comment 1 Adam Mariš 2017-04-19 08:13:20 UTC
Created community-mysql tracking bugs for this issue:

Affects: fedora-all [bug 1443407]

Comment 2 Tomas Hoger 2017-04-20 12:57:29 UTC
The only recent change to the innodb_memcached plugin is:

https://github.com/mysql/mysql-server/commit/659514dc83299a7d8c7defeb543be4339fbe1ee1

Also mentioned in the release notes:

  InnoDB: A memcached read operation with a non-default read batch size
  configuration resulted in a server exit. (Bug #25147515)

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-36.html

While Oracle CPU lists this as unauthenticated attack, attacker requires read access to the mysqld's memcached port.  MySQL documentation explicitly notes that only trusted users should be granted such access.

https://dev.mysql.com/doc/refman/5.7/en/innodb-memcached-security.html

Comment 5 errata-xmlrpc 2017-09-21 07:48:32 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2787

Comment 6 errata-xmlrpc 2017-10-12 08:00:11 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2017:2886


Note You need to log in before you can comment on or make changes to this bug.