Vulnerability identifier: #VU44381
Vulnerability risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
mysql
Vendor: Google
Description
The vulnerability allows a remote #AU# to perform service disruption.
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors.
Mitigation
Install update from vendor's website.
Vulnerable software versions
mysql: 5.0.0 - 5.5.21
External links
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
https://osvdb.org/78388
https://secunia.com/advisories/48250
https://secunia.com/advisories/53372
https://security.gentoo.org/glsa/glsa-201308-06.xml
https://www.debian.org/security/2012/dsa-2429
https://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
https://www.securityfocus.com/bid/51524
https://www.ubuntu.com/usn/USN-1397-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/72531
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.