CVE-2017-10378

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
References
Link Resource
http://www.debian.org/security/2017/dsa-4002 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Patch Vendor Advisory
http://www.securityfocus.com/bid/101375 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039597 Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:3265 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3442 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0279 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0574 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2439 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2729 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1258 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20171019-0002/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4341 Third Party Advisory
http://www.debian.org/security/2017/dsa-4002 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Patch Vendor Advisory
http://www.securityfocus.com/bid/101375 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039597 Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:3265 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3442 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0279 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0574 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2439 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2729 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1258 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20171019-0002/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4341 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-10-19 17:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-10378

Mitre link : CVE-2017-10378

CVE.ORG link : CVE-2017-10378


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_server_aus
  • enterprise_linux_desktop
  • openstack
  • enterprise_linux_eus
  • enterprise_linux_server
  • enterprise_linux_server_tus

netapp

  • active_iq_unified_manager
  • oncommand_balance
  • oncommand_performance_manager
  • snapcenter
  • oncommand_unified_manager
  • oncommand_workflow_automation
  • oncommand_insight

debian

  • debian_linux

oracle

  • mysql

mariadb

  • mariadb