← Back to CVEs
CVE-2017-10268
MEDIUM4.1
Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
CVE Details
CVSS v3.1 Score4.1
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack VectorLOCAL
ComplexityHIGH
Privileges RequiredHIGH
User InteractionNONE
Published10/19/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
debian:debian_linuxmariadb:mariadbnetapp:active_iq_unified_managernetapp:oncommand_balancenetapp:oncommand_insightnetapp:oncommand_performance_managernetapp:oncommand_unified_managernetapp:oncommand_workflow_automationnetapp:snapcenteroracle:mysqlredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:openstack
References
http://www.debian.org/security/2017/dsa-4002(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html(secalert_us@oracle.com)
http://www.securityfocus.com/bid/101390(secalert_us@oracle.com)
http://www.securitytracker.com/id/1039597(secalert_us@oracle.com)
https://access.redhat.com/errata/RHSA-2017:3265(secalert_us@oracle.com)
https://access.redhat.com/errata/RHSA-2017:3442(secalert_us@oracle.com)
https://access.redhat.com/errata/RHSA-2018:0279(secalert_us@oracle.com)
https://access.redhat.com/errata/RHSA-2018:0574(secalert_us@oracle.com)
https://access.redhat.com/errata/RHSA-2018:2439(secalert_us@oracle.com)
https://access.redhat.com/errata/RHSA-2018:2729(secalert_us@oracle.com)
https://access.redhat.com/errata/RHSA-2019:1258(secalert_us@oracle.com)
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html(secalert_us@oracle.com)
https://security.netapp.com/advisory/ntap-20171019-0002/(secalert_us@oracle.com)
https://www.debian.org/security/2018/dsa-4341(secalert_us@oracle.com)
http://www.debian.org/security/2017/dsa-4002(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/101390(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1039597(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3265(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3442(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0279(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0574(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2439(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2729(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1258(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20171019-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4341(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.