SB2018032618 - Red Hat Software Collections update for rh-mysql57-mysql 



SB2018032618 - Red Hat Software Collections update for rh-mysql57-mysql

Published: March 26, 2018

Security Bulletin ID SB2018032618
Severity
Medium
Patch available
YES
Number of vulnerabilities 18
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 6% Low 94%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 18 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2018-2565)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


2) Improper input validation (CVE-ID: CVE-2018-2573)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


3) Improper input validation (CVE-ID: CVE-2018-2576)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


4) Improper input validation (CVE-ID: CVE-2018-2583)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


5) Improper input validation (CVE-ID: CVE-2018-2586)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


6) Improper input validation (CVE-ID: CVE-2018-2590)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


7) Improper input validation (CVE-ID: CVE-2018-2600)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


8) Improper Access Control (CVE-ID: CVE-2018-2612)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify or delete certain data in database.


9) Improper input validation (CVE-ID: CVE-2018-2622)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


10) Improper input validation (CVE-ID: CVE-2018-2640)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


11) Information Exposure (CVE-ID: CVE-2018-2645)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to gain access to sensitive information.


12) Improper input validation (CVE-ID: CVE-2018-2646)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


13) Improper Access Control (CVE-ID: CVE-2018-2647)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify certain data on the system and perform a denial of service (DoS) attack.


14) Improper input validation (CVE-ID: CVE-2018-2665)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


15) Improper input validation (CVE-ID: CVE-2018-2667)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


16) Improper input validation (CVE-ID: CVE-2018-2668)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


17) Improper input validation (CVE-ID: CVE-2018-2696)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote unauthenticated attacker can exploit the vulnerability to perform a denial of service attack.


18) Improper input validation (CVE-ID: CVE-2018-2703)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


Remediation

Install update from vendor's website.