Vulnerability identifier: #VU44400
Vulnerability risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2012-0075
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
mysql
Vendor: Google
Description
The vulnerability allows a remote #AU# to manipulate data.
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.
Mitigation
Install update from vendor's website.
Vulnerable software versions
mysql: 5.0.0 - 5.5.21
External links
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
https://osvdb.org/78374
https://secunia.com/advisories/48250
https://secunia.com/advisories/53372
https://security.gentoo.org/glsa/glsa-201308-06.xml
https://www.debian.org/security/2012/dsa-2429
https://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
https://www.securityfocus.com/bid/51526
https://www.ubuntu.com/usn/USN-1397-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/72539
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.