{"containers":{"cna":{"affected":[{"product":"MySQL Server","vendor":"Oracle Corporation","versions":[{"status":"affected","version":"5.5.54 and earlier"},{"status":"affected","version":"5.6.20 and earlier"}]}],"datePublic":"2017-02-11T00:00:00.000Z","descriptions":[{"lang":"en","value":"Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3."}],"problemTypes":[{"descriptions":[{"description":"Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-03-22T09:57:01.000Z","orgId":"43595867-4340-4103-b7a2-9a5208d29a85","shortName":"oracle"},"references":[{"name":"96162","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/96162"},{"name":"RHSA-2017:2787","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"name":"1038287","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1038287"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"name":"RHSA-2018:0574","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"name":"RHSA-2018:0279","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"name":"DSA-3834","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2017/dsa-3834"},{"name":"DSA-3809","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2017/dsa-3809"},{"tags":["x_refsource_MISC"],"url":"http://www.openwall.com/lists/oss-security/2017/02/11/11"},{"name":"RHSA-2017:2192","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2017:2192"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert_us@oracle.com","ID":"CVE-2017-3302","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"MySQL Server","version":{"version_data":[{"version_affected":"=","version_value":"5.5.54 and earlier"},{"version_affected":"=","version_value":"5.6.20 and earlier"}]}}]},"vendor_name":"Oracle Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server."}]}]},"references":{"reference_data":[{"name":"96162","refsource":"BID","url":"http://www.securityfocus.com/bid/96162"},{"name":"RHSA-2017:2787","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"name":"1038287","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1038287"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"name":"RHSA-2018:0574","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"name":"RHSA-2018:0279","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"name":"DSA-3834","refsource":"DEBIAN","url":"http://www.debian.org/security/2017/dsa-3834"},{"name":"DSA-3809","refsource":"DEBIAN","url":"http://www.debian.org/security/2017/dsa-3809"},{"name":"http://www.openwall.com/lists/oss-security/2017/02/11/11","refsource":"MISC","url":"http://www.openwall.com/lists/oss-security/2017/02/11/11"},{"name":"RHSA-2017:2192","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2017:2192"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T14:23:33.637Z"},"title":"CVE Program Container","references":[{"name":"96162","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/96162"},{"name":"RHSA-2017:2787","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"name":"1038287","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1038287"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"name":"RHSA-2018:0574","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"name":"RHSA-2018:0279","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"name":"DSA-3834","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2017/dsa-3834"},{"name":"DSA-3809","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2017/dsa-3809"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2017/02/11/11"},{"name":"RHSA-2017:2192","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2017:2192"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-08T20:04:48.579501Z","id":"CVE-2017-3302","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-08T20:13:36.675Z"}}]},"cveMetadata":{"assignerOrgId":"43595867-4340-4103-b7a2-9a5208d29a85","assignerShortName":"oracle","cveId":"CVE-2017-3302","datePublished":"2017-02-12T04:43:00.000Z","dateReserved":"2016-12-06T00:00:00.000Z","dateUpdated":"2024-10-08T20:13:36.675Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}