SB2018032618 - Red Hat Software Collections update for rh-mysql57-mysql
Published: March 26, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 18 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2018-2565)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
2) Improper input validation (CVE-ID: CVE-2018-2573)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
3) Improper input validation (CVE-ID: CVE-2018-2576)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
4) Improper input validation (CVE-ID: CVE-2018-2583)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
5) Improper input validation (CVE-ID: CVE-2018-2586)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
6) Improper input validation (CVE-ID: CVE-2018-2590)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
7) Improper input validation (CVE-ID: CVE-2018-2600)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
8) Improper Access Control (CVE-ID: CVE-2018-2612)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify or delete certain data in database.
9) Improper input validation (CVE-ID: CVE-2018-2622)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
10) Improper input validation (CVE-ID: CVE-2018-2640)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
11) Information Exposure (CVE-ID: CVE-2018-2645)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to gain access to sensitive information.
12) Improper input validation (CVE-ID: CVE-2018-2646)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
13) Improper Access Control (CVE-ID: CVE-2018-2647)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify certain data on the system and perform a denial of service (DoS) attack.
14) Improper input validation (CVE-ID: CVE-2018-2665)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
15) Improper input validation (CVE-ID: CVE-2018-2667)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
16) Improper input validation (CVE-ID: CVE-2018-2668)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
17) Improper input validation (CVE-ID: CVE-2018-2696)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote unauthenticated attacker can exploit the vulnerability to perform a denial of service attack.
18) Improper input validation (CVE-ID: CVE-2018-2703)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
Remediation
Install update from vendor's website.