CVE-2018-2773
low-risk
Published 2018-04-19
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.1/10
Medium
LOCAL
/ HIGH complexity
Affected Products (6)
References (22)
Third Party Advisory
http://www.securityfocus.com/bid/103811
Third Party Advisory
http://www.securitytracker.com/id/1040698
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180419-0002/
Third Party Advisory
https://usn.ubuntu.com/3629-1/
Third Party Advisory
https://www.debian.org/security/2018/dsa-4176
Third Party Advisory
http://www.securityfocus.com/bid/103811
Third Party Advisory
http://www.securitytracker.com/id/1040698
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180419-0002/
Third Party Advisory
https://usn.ubuntu.com/3629-1/
and 2 more references
24
/ 100
low-risk
Severity
11/34 · Low
Exploitability
0/34 · Minimal
Exposure
13/34 · Low