Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-21272
Vulnerability from cvelistv5
Published
2024-10-15 19:52
Modified
2024-10-16 15:00
Severity ?
EPSS score ?
Summary
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
References
▼ | URL | Tags | |
---|---|---|---|
secalert_us@oracle.com | https://www.oracle.com/security-alerts/cpuoct2024.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Oracle Corporation | MySQL Connectors |
Version: * < cpe:2.3:a:oracle:mysql_connector\/python:9.0.0_and_prior:*:*:*:*:*:*:* |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-21272", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-15T20:31:30.753950Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-306", description: "CWE-306 Missing Authentication for Critical Function", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-16T15:00:31.534Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { cpes: [ "cpe:2.3:a:oracle:mysql_connector\\/python:9.0.0_and_prior:*:*:*:*:*:*:*", ], product: "MySQL Connectors", vendor: "Oracle Corporation", versions: [ { lessThanOrEqual: "9.0.0", status: "affected", version: "*", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en-US", value: "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors.", lang: "en-US", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-15T19:52:58.536Z", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "Oracle Advisory", tags: [ "vendor-advisory", ], url: "https://www.oracle.com/security-alerts/cpuoct2024.html", }, ], }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2024-21272", datePublished: "2024-10-15T19:52:58.536Z", dateReserved: "2023-12-07T22:28:10.705Z", dateUpdated: "2024-10-16T15:00:31.534Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD1DFA06-03A1-41E6-BF09-156C1084A811\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en el producto MySQL Connectors de Oracle MySQL (componente: Connector/Python). Las versiones compatibles afectadas son 9.0.0 y anteriores. Esta vulnerabilidad, que es dif\\u00edcil de explotar, permite que un atacante con pocos privilegios y acceso a la red a trav\\u00e9s de m\\u00faltiples protocolos ponga en peligro MySQL Connectors. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la toma de control de MySQL Connectors. Puntuaci\\u00f3n base CVSS 3.1: 7,5 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).\"}]", id: "CVE-2024-21272", lastModified: "2024-10-21T16:14:28.780", metrics: "{\"cvssMetricV31\": [{\"source\": \"secalert_us@oracle.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 5.9}]}", published: "2024-10-15T20:15:18.963", references: "[{\"url\": \"https://www.oracle.com/security-alerts/cpuoct2024.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Vendor Advisory\"]}]", sourceIdentifier: "secalert_us@oracle.com", vulnStatus: "Analyzed", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-306\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2024-21272\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2024-10-15T20:15:18.963\",\"lastModified\":\"2024-10-21T16:14:28.780\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el producto MySQL Connectors de Oracle MySQL (componente: Connector/Python). Las versiones compatibles afectadas son 9.0.0 y anteriores. Esta vulnerabilidad, que es difícil de explotar, permite que un atacante con pocos privilegios y acceso a la red a través de múltiples protocolos ponga en peligro MySQL Connectors. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la toma de control de MySQL Connectors. Puntuación base CVSS 3.1: 7,5 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1DFA06-03A1-41E6-BF09-156C1084A811\"}]}]}],\"references\":[{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2024.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-21272\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-15T20:31:30.753950Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-306\", \"description\": \"CWE-306 Missing Authentication for Critical Function\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-16T15:00:25.268Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:oracle:mysql_connector\\\\/python:9.0.0_and_prior:*:*:*:*:*:*:*\"], \"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Connectors\", \"versions\": [{\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.0.0\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpuoct2024.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2024-10-15T19:52:58.536Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2024-21272\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-16T15:00:31.534Z\", \"dateReserved\": \"2023-12-07T22:28:10.705Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2024-10-15T19:52:58.536Z\", \"assignerShortName\": \"oracle\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
opensuse-su-2024:14421-1
Vulnerability from csaf_opensuse
Published
2024-10-22 00:00
Modified
2024-10-22 00:00
Summary
python310-mysql-connector-python-9.1.0-1.1 on GA media
Notes
Title of the patch
python310-mysql-connector-python-9.1.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the python310-mysql-connector-python-9.1.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14421
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "python310-mysql-connector-python-9.1.0-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the python310-mysql-connector-python-9.1.0-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-14421", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14421-1.json", }, { category: "self", summary: "SUSE CVE CVE-2024-21272 page", url: "https://www.suse.com/security/cve/CVE-2024-21272/", }, ], title: "python310-mysql-connector-python-9.1.0-1.1 on GA media", tracking: { current_release_date: "2024-10-22T00:00:00Z", generator: { date: "2024-10-22T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:14421-1", initial_release_date: "2024-10-22T00:00:00Z", revision_history: [ { date: "2024-10-22T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python310-mysql-connector-python-9.1.0-1.1.aarch64", product: { name: "python310-mysql-connector-python-9.1.0-1.1.aarch64", product_id: "python310-mysql-connector-python-9.1.0-1.1.aarch64", }, }, { category: "product_version", name: "python311-mysql-connector-python-9.1.0-1.1.aarch64", product: { name: "python311-mysql-connector-python-9.1.0-1.1.aarch64", product_id: "python311-mysql-connector-python-9.1.0-1.1.aarch64", }, }, { category: "product_version", name: "python312-mysql-connector-python-9.1.0-1.1.aarch64", product: { name: "python312-mysql-connector-python-9.1.0-1.1.aarch64", product_id: "python312-mysql-connector-python-9.1.0-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "python310-mysql-connector-python-9.1.0-1.1.ppc64le", product: { name: "python310-mysql-connector-python-9.1.0-1.1.ppc64le", product_id: "python310-mysql-connector-python-9.1.0-1.1.ppc64le", }, }, { category: "product_version", name: "python311-mysql-connector-python-9.1.0-1.1.ppc64le", product: { name: "python311-mysql-connector-python-9.1.0-1.1.ppc64le", product_id: "python311-mysql-connector-python-9.1.0-1.1.ppc64le", }, }, { category: "product_version", name: "python312-mysql-connector-python-9.1.0-1.1.ppc64le", product: { name: "python312-mysql-connector-python-9.1.0-1.1.ppc64le", product_id: "python312-mysql-connector-python-9.1.0-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "python310-mysql-connector-python-9.1.0-1.1.s390x", product: { name: "python310-mysql-connector-python-9.1.0-1.1.s390x", product_id: "python310-mysql-connector-python-9.1.0-1.1.s390x", }, }, { category: "product_version", name: "python311-mysql-connector-python-9.1.0-1.1.s390x", product: { name: "python311-mysql-connector-python-9.1.0-1.1.s390x", product_id: "python311-mysql-connector-python-9.1.0-1.1.s390x", }, }, { category: "product_version", name: "python312-mysql-connector-python-9.1.0-1.1.s390x", product: { name: "python312-mysql-connector-python-9.1.0-1.1.s390x", product_id: "python312-mysql-connector-python-9.1.0-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python310-mysql-connector-python-9.1.0-1.1.x86_64", product: { name: "python310-mysql-connector-python-9.1.0-1.1.x86_64", product_id: "python310-mysql-connector-python-9.1.0-1.1.x86_64", }, }, { category: "product_version", name: "python311-mysql-connector-python-9.1.0-1.1.x86_64", product: { name: "python311-mysql-connector-python-9.1.0-1.1.x86_64", product_id: "python311-mysql-connector-python-9.1.0-1.1.x86_64", }, }, { category: "product_version", name: "python312-mysql-connector-python-9.1.0-1.1.x86_64", product: { name: "python312-mysql-connector-python-9.1.0-1.1.x86_64", product_id: "python312-mysql-connector-python-9.1.0-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python310-mysql-connector-python-9.1.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.aarch64", }, product_reference: "python310-mysql-connector-python-9.1.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-mysql-connector-python-9.1.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.ppc64le", }, product_reference: "python310-mysql-connector-python-9.1.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-mysql-connector-python-9.1.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.s390x", }, product_reference: "python310-mysql-connector-python-9.1.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-mysql-connector-python-9.1.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.x86_64", }, product_reference: "python310-mysql-connector-python-9.1.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-mysql-connector-python-9.1.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.aarch64", }, product_reference: "python311-mysql-connector-python-9.1.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-mysql-connector-python-9.1.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.ppc64le", }, product_reference: "python311-mysql-connector-python-9.1.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-mysql-connector-python-9.1.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.s390x", }, product_reference: "python311-mysql-connector-python-9.1.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-mysql-connector-python-9.1.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.x86_64", }, product_reference: "python311-mysql-connector-python-9.1.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-mysql-connector-python-9.1.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.aarch64", }, product_reference: "python312-mysql-connector-python-9.1.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-mysql-connector-python-9.1.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.ppc64le", }, product_reference: "python312-mysql-connector-python-9.1.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-mysql-connector-python-9.1.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.s390x", }, product_reference: "python312-mysql-connector-python-9.1.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-mysql-connector-python-9.1.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.x86_64", }, product_reference: "python312-mysql-connector-python-9.1.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2024-21272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-21272", }, ], notes: [ { category: "general", text: "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.aarch64", "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.s390x", "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.x86_64", "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.aarch64", "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.s390x", "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.x86_64", "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.aarch64", "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.s390x", "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-21272", url: "https://www.suse.com/security/cve/CVE-2024-21272", }, { category: "external", summary: "SUSE Bug 1231740 for CVE-2024-21272", url: "https://bugzilla.suse.com/1231740", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.aarch64", "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.s390x", "openSUSE Tumbleweed:python310-mysql-connector-python-9.1.0-1.1.x86_64", "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.aarch64", "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.s390x", "openSUSE Tumbleweed:python311-mysql-connector-python-9.1.0-1.1.x86_64", "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.aarch64", "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.s390x", "openSUSE Tumbleweed:python312-mysql-connector-python-9.1.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-10-22T00:00:00Z", details: "important", }, ], title: "CVE-2024-21272", }, ], }
opensuse-su-2024:0351-1
Vulnerability from csaf_opensuse
Published
2024-11-06 17:13
Modified
2024-11-06 17:13
Summary
Security update for python-mysql-connector-python
Notes
Title of the patch
Security update for python-mysql-connector-python
Description of the patch
This update for python-mysql-connector-python fixes the following issues:
- Update to 9.1.0 (boo#1231740, CVE-2024-21272)
- WL#16452: Bundle all installable authentication plugins when building the C-extension
- WL#16444: Drop build support for DEB packages
- WL#16442: Upgrade gssapi version to 1.8.3
- WL#16411: Improve wheel metadata information for Classic and XDevAPI connectors
- WL#16341: OpenID Connect (Oauth2 - JWT) Authentication Support
- WL#16307: Remove Python 3.8 support
- WL#16306: Add support for Python 3.13
- BUG#37055435: Connection fails during the TLS negotiation when specifying TLSv1.3 ciphers
- BUG#37013057: mysql-connector-python Parameterized query SQL injection
- BUG#36765200: python mysql connector 8.3.0 raise %-.100s:%u when input a wrong host
- BUG#36577957: Update charset/collation description indicate this is 16 bits
- 9.0.0:
- WL#16350: Update dnspython version
- WL#16318: Deprecate Cursors Prepared Raw and Named Tuple
- WL#16284: Update the Python Protobuf version
- WL#16283: Remove OpenTelemetry Bundled Installation
- BUG#36664998: Packets out of order error is raised while changing user in aio
- BUG#36611371: Update dnspython required versions to allow latest 2.6.1
- BUG#36570707: Collation set on connect using C-Extension is ignored
- BUG#36476195: Incorrect escaping in pure Python mode if sql_mode includes NO_BACKSLASH_ESCAPES
- BUG#36289767: MySQLCursorBufferedRaw does not skip conversion
- 8.4.0
- WL#16203: GPL License Exception Update
- WL#16173: Update allowed cipher and cipher-suite lists
- WL#16164: Implement support for new vector data type
- WL#16127: Remove the FIDO authentication mechanism
- WL#16053: Support GSSAPI/Kerberos authentication on Windows using authentication_ldap_sasl_client plug-in for C-extension
- BUG#36227964: Improve OpenTelemetry span coverage
- BUG#36167880: Massive memory leak mysqlx native Protobuf adding to collection
- 8.3.0
- WL#16015: Remove use of removed COM_ commands
- WL#15985: Support GSSAPI/Kerberos authentication on Windows using authentication_ldap_sasl_client plug-in for Pure Python
- WL#15983: Stop using mysql_ssl_set api
- WL#15982: Remove use of mysql_shutdown
- WL#15950: Support query parameters for prepared statements
- WL#15942: Improve type hints and standardize byte type handling
- WL#15836: Split mysql and mysqlx into different packages
- WL#15523: Support Python DB API asynchronous execution
- BUG#35912790: Binary strings are converted when using prepared statements
- BUG#35832148: Fix Django timezone.utc deprecation warning
- BUG#35710145: Bad MySQLCursor.statement and result when query text contains code comments
- BUG#21390859: STATEMENTS GET OUT OF SYNCH WITH RESULT SETS
Patchnames
openSUSE-2024-351
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for python-mysql-connector-python", title: "Title of the patch", }, { category: "description", text: "This update for python-mysql-connector-python fixes the following issues:\n\n- Update to 9.1.0 (boo#1231740, CVE-2024-21272)\n - WL#16452: Bundle all installable authentication plugins when building the C-extension\n - WL#16444: Drop build support for DEB packages\n - WL#16442: Upgrade gssapi version to 1.8.3\n - WL#16411: Improve wheel metadata information for Classic and XDevAPI connectors\n - WL#16341: OpenID Connect (Oauth2 - JWT) Authentication Support\n - WL#16307: Remove Python 3.8 support\n - WL#16306: Add support for Python 3.13\n - BUG#37055435: Connection fails during the TLS negotiation when specifying TLSv1.3 ciphers\n - BUG#37013057: mysql-connector-python Parameterized query SQL injection\n - BUG#36765200: python mysql connector 8.3.0 raise %-.100s:%u when input a wrong host\n - BUG#36577957: Update charset/collation description indicate this is 16 bits\n- 9.0.0:\n - WL#16350: Update dnspython version\n - WL#16318: Deprecate Cursors Prepared Raw and Named Tuple\n - WL#16284: Update the Python Protobuf version\n - WL#16283: Remove OpenTelemetry Bundled Installation\n - BUG#36664998: Packets out of order error is raised while changing user in aio\n - BUG#36611371: Update dnspython required versions to allow latest 2.6.1\n - BUG#36570707: Collation set on connect using C-Extension is ignored\n - BUG#36476195: Incorrect escaping in pure Python mode if sql_mode includes NO_BACKSLASH_ESCAPES\n - BUG#36289767: MySQLCursorBufferedRaw does not skip conversion\n- 8.4.0\n - WL#16203: GPL License Exception Update\n - WL#16173: Update allowed cipher and cipher-suite lists\n - WL#16164: Implement support for new vector data type\n - WL#16127: Remove the FIDO authentication mechanism\n - WL#16053: Support GSSAPI/Kerberos authentication on Windows using authentication_ldap_sasl_client plug-in for C-extension\n - BUG#36227964: Improve OpenTelemetry span coverage\n - BUG#36167880: Massive memory leak mysqlx native Protobuf adding to collection\n- 8.3.0\n - WL#16015: Remove use of removed COM_ commands\n - WL#15985: Support GSSAPI/Kerberos authentication on Windows using authentication_ldap_sasl_client plug-in for Pure Python\n - WL#15983: Stop using mysql_ssl_set api\n - WL#15982: Remove use of mysql_shutdown\n - WL#15950: Support query parameters for prepared statements\n - WL#15942: Improve type hints and standardize byte type handling\n - WL#15836: Split mysql and mysqlx into different packages\n - WL#15523: Support Python DB API asynchronous execution\n - BUG#35912790: Binary strings are converted when using prepared statements\n - BUG#35832148: Fix Django timezone.utc deprecation warning\n - BUG#35710145: Bad MySQLCursor.statement and result when query text contains code comments\n - BUG#21390859: STATEMENTS GET OUT OF SYNCH WITH RESULT SETS\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2024-351", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0351-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2024:0351-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4QYWY7IAP4RFAA3R6QMK3Q6FFAY4UOZ/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2024:0351-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4QYWY7IAP4RFAA3R6QMK3Q6FFAY4UOZ/", }, { category: "self", summary: "SUSE Bug 1231740", url: "https://bugzilla.suse.com/1231740", }, { category: "self", summary: "SUSE CVE CVE-2024-21272 page", url: "https://www.suse.com/security/cve/CVE-2024-21272/", }, ], title: "Security update for python-mysql-connector-python", tracking: { current_release_date: "2024-11-06T17:13:19Z", generator: { date: "2024-11-06T17:13:19Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:0351-1", initial_release_date: "2024-11-06T17:13:19Z", revision_history: [ { date: "2024-11-06T17:13:19Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", product: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", product_id: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", product: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", product_id: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", product: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", product_id: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", product: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", product_id: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", product: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", product_id: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Package Hub 15 SP5", product: { name: "SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5", }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64 as component of SUSE Package Hub 15 SP5", product_id: "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP5", }, { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", }, product_reference: "python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2024-21272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-21272", }, ], notes: [ { category: "general", text: "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-21272", url: "https://www.suse.com/security/cve/CVE-2024-21272", }, { category: "external", summary: "SUSE Bug 1231740 for CVE-2024-21272", url: "https://bugzilla.suse.com/1231740", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", "SUSE Package Hub 15 SP5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.aarch64", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.i586", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.ppc64le", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.s390x", "openSUSE Leap 15.5:python3-mysql-connector-python-9.1.0-bp155.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-11-06T17:13:19Z", details: "important", }, ], title: "CVE-2024-21272", }, ], }
wid-sec-w-2024-3188
Vulnerability from csaf_certbund
Published
2024-10-15 22:00
Modified
2024-11-12 23:00
Summary
Oracle MySQL: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
MySQL ist ein Open Source Datenbankserver von Oracle.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Windows
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "MySQL ist ein Open Source Datenbankserver von Oracle.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.", title: "Angriff", }, { category: "general", text: "- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3188 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3188.json", }, { category: "self", summary: "WID-SEC-2024-3188 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3188", }, { category: "external", summary: "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle MySQL vom 2024-10-15", url: "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL", }, { category: "external", summary: "NetApp Security Advisory NTAP-20241025-0006 vom 2024-10-25", url: "https://security.netapp.com/advisory/ntap-20241025-0006/", }, { category: "external", summary: "openSUSE Security Update OPENSUSE-SU-2024:0351-1 vom 2024-11-07", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4QYWY7IAP4RFAA3R6QMK3Q6FFAY4UOZ/", }, { category: "external", summary: "Ubuntu Security Notice USN-7102-1 vom 2024-11-12", url: "https://ubuntu.com/security/notices/USN-7102-1", }, ], source_lang: "en-US", title: "Oracle MySQL: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-12T23:00:00.000+00:00", generator: { date: "2024-11-13T09:16:37.317+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-3188", initial_release_date: "2024-10-15T22:00:00.000+00:00", revision_history: [ { date: "2024-10-15T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-10-27T23:00:00.000+00:00", number: "2", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2024-11-06T23:00:00.000+00:00", number: "3", summary: "Neue Updates von openSUSE aufgenommen", }, { date: "2024-11-12T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "4", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "NetApp ActiveIQ Unified Manager", product: { name: "NetApp ActiveIQ Unified Manager", product_id: "T034126", product_identification_helper: { cpe: "cpe:/a:netapp:active_iq_unified_manager:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { branches: [ { category: "product_version_range", name: "<=8.0.35", product: { name: "Oracle MySQL <=8.0.35", product_id: "1566667", }, }, { category: "product_version_range", name: "<=8.0.35", product: { name: "Oracle MySQL <=8.0.35", product_id: "1566667-fixed", }, }, { category: "product_version", name: "8.4.0", product: { name: "Oracle MySQL 8.4.0", product_id: "T036237", product_identification_helper: { cpe: "cpe:/a:oracle:mysql:8.4.0", }, }, }, { category: "product_version_range", name: "<=8.4.1", product: { name: "Oracle MySQL <=8.4.1", product_id: "T036240", }, }, { category: "product_version_range", name: "<=8.4.1", product: { name: "Oracle MySQL <=8.4.1", product_id: "T036240-fixed", }, }, { category: "product_version_range", name: "<=9.0.0", product: { name: "Oracle MySQL <=9.0.0", product_id: "T036241", }, }, { category: "product_version_range", name: "<=9.0.0", product: { name: "Oracle MySQL <=9.0.0", product_id: "T036241-fixed", }, }, { category: "product_version_range", name: "<=8.0.38", product: { name: "Oracle MySQL <=8.0.38", product_id: "T036275", }, }, { category: "product_version_range", name: "<=8.0.38", product: { name: "Oracle MySQL <=8.0.38", product_id: "T036275-fixed", }, }, { category: "product_version_range", name: "<=8.0.39", product: { name: "Oracle MySQL <=8.0.39", product_id: "T038403", }, }, { category: "product_version_range", name: "<=8.0.39", product: { name: "Oracle MySQL <=8.0.39", product_id: "T038403-fixed", }, }, { category: "product_version_range", name: "<=8.4.2", product: { name: "Oracle MySQL <=8.4.2", product_id: "T038404", }, }, { category: "product_version_range", name: "<=8.4.2", product: { name: "Oracle MySQL <=8.4.2", product_id: "T038404-fixed", }, }, { category: "product_version_range", name: "<=9.0.1", product: { name: "Oracle MySQL <=9.0.1", product_id: "T038405", }, }, { category: "product_version_range", name: "<=9.0.1", product: { name: "Oracle MySQL <=9.0.1", product_id: "T038405-fixed", }, }, { category: "product_version_range", name: "<=7.5.35", product: { name: "Oracle MySQL <=7.5.35", product_id: "T038406", }, }, { category: "product_version_range", name: "<=7.5.35", product: { name: "Oracle MySQL <=7.5.35", product_id: "T038406-fixed", }, }, { category: "product_version_range", name: "<=7.6.31", product: { name: "Oracle MySQL <=7.6.31", product_id: "T038407", }, }, { category: "product_version_range", name: "<=7.6.31", product: { name: "Oracle MySQL <=7.6.31", product_id: "T038407-fixed", }, }, ], category: "product_name", name: "MySQL", }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "SUSE openSUSE", product: { name: "SUSE openSUSE", product_id: "T027843", product_identification_helper: { cpe: "cpe:/o:suse:opensuse:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2024-21193", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21193", }, { cve: "CVE-2024-21194", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21194", }, { cve: "CVE-2024-21196", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21196", }, { cve: "CVE-2024-21197", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21197", }, { cve: "CVE-2024-21198", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21198", }, { cve: "CVE-2024-21199", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21199", }, { cve: "CVE-2024-21200", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21200", }, { cve: "CVE-2024-21201", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21201", }, { cve: "CVE-2024-21203", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21203", }, { cve: "CVE-2024-21204", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21204", }, { cve: "CVE-2024-21207", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21207", }, { cve: "CVE-2024-21209", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21209", }, { cve: "CVE-2024-21212", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21212", }, { cve: "CVE-2024-21213", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21213", }, { cve: "CVE-2024-21218", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21218", }, { cve: "CVE-2024-21219", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21219", }, { cve: "CVE-2024-21230", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21230", }, { cve: "CVE-2024-21231", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21231", }, { cve: "CVE-2024-21232", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21232", }, { cve: "CVE-2024-21236", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21236", }, { cve: "CVE-2024-21237", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21237", }, { cve: "CVE-2024-21238", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21238", }, { cve: "CVE-2024-21239", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21239", }, { cve: "CVE-2024-21241", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21241", }, { cve: "CVE-2024-21243", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21243", }, { cve: "CVE-2024-21244", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21244", }, { cve: "CVE-2024-21247", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21247", }, { cve: "CVE-2024-21262", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21262", }, { cve: "CVE-2024-21272", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-21272", }, { cve: "CVE-2024-28182", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-28182", }, { cve: "CVE-2024-37371", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-37371", }, { cve: "CVE-2024-5535", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-5535", }, { cve: "CVE-2024-7264", notes: [ { category: "description", text: "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"HIGH\" für \"Confidentiality\", \"Integrity\" und \"Availability\" über alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" für die Schadenshöhe.", }, ], product_status: { known_affected: [ "T034126", "T000126", "T027843", "T036237", ], last_affected: [ "T036240", "T038405", "T038406", "T038407", "1566667", "T038403", "T038404", "T036241", "T036275", ], }, release_date: "2024-10-15T22:00:00.000+00:00", title: "CVE-2024-7264", }, ], }
NCSC-2024-0420
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:20
Modified
2024-10-17 13:20
Summary
Kwetsbaarheden verholpen in Oracle MySQL
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in MySQL.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om toegang te krijgen tot gevoelige gegevens in de database en deze mogelijk te manipuleren.
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-390
Detection of Error Condition Without Action
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-345
Insufficient Verification of Data Authenticity
CWE-190
Integer Overflow or Wraparound
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-20
Improper Input Validation
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Oracle heeft kwetsbaarheden verholpen in MySQL.", title: "Feiten", }, { category: "description", text: "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om toegang te krijgen tot gevoelige gegevens in de database en deze mogelijk te manipuleren.", title: "Interpretaties", }, { category: "description", text: "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Detection of Error Condition Without Action", title: "CWE-390", }, { category: "general", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, { category: "general", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "general", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "general", text: "Out-of-bounds Read", title: "CWE-125", }, { category: "general", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "general", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", url: "https://www.oracle.com/security-alerts/cpuoct2024.html", }, ], title: "Kwetsbaarheden verholpen in Oracle MySQL", tracking: { current_release_date: "2024-10-17T13:20:42.437738Z", id: "NCSC-2024-0420", initial_release_date: "2024-10-17T13:20:42.437738Z", revision_history: [ { date: "2024-10-17T13:20:42.437738Z", number: "0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "mysql_cluster", product: { name: "mysql_cluster", product_id: "CSAFPID-764289", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_connectors", product: { name: "mysql_connectors", product_id: "CSAFPID-221160", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql", product: { name: "mysql", product_id: "CSAFPID-249429", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_enterprise_backup", product: { name: "mysql_enterprise_backup", product_id: "CSAFPID-1673522", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_enterprise_backup:9.0.1_and_prior:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_enterprise_monitor", product: { name: "mysql_enterprise_monitor", product_id: "CSAFPID-764290", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_server", product: { name: "mysql_server", product_id: "CSAFPID-504250", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_workbench", product: { name: "mysql_workbench", product_id: "CSAFPID-764763", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_client", product: { name: "mysql_client", product_id: "CSAFPID-1673440", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "oracle", }, ], }, vulnerabilities: [ { cve: "CVE-2023-45853", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, notes: [ { category: "other", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], product_status: { known_affected: [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-764763", ], }, references: [ { category: "self", summary: "CVE-2023-45853", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45853.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-764763", ], }, ], title: "CVE-2023-45853", }, { cve: "CVE-2024-5535", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, ], product_status: { known_affected: [ "CSAFPID-1673522", ], }, references: [ { category: "self", summary: "CVE-2024-5535", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673522", ], }, ], title: "CVE-2024-5535", }, { cve: "CVE-2024-7264", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "other", text: "Out-of-bounds Read", title: "CWE-125", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-1673522", ], }, references: [ { category: "self", summary: "CVE-2024-7264", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673522", ], }, ], title: "CVE-2024-7264", }, { cve: "CVE-2024-21193", references: [ { category: "self", summary: "CVE-2024-21193", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21193.json", }, ], title: "CVE-2024-21193", }, { cve: "CVE-2024-21194", references: [ { category: "self", summary: "CVE-2024-21194", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21194.json", }, ], title: "CVE-2024-21194", }, { cve: "CVE-2024-21196", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21196", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21196.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21196", }, { cve: "CVE-2024-21197", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21197", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21197.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21197", }, { cve: "CVE-2024-21198", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21198", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21198.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21198", }, { cve: "CVE-2024-21199", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21199", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21199.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21199", }, { cve: "CVE-2024-21200", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21200", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21200.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21200", }, { cve: "CVE-2024-21201", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21201", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21201.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21201", }, { cve: "CVE-2024-21203", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21203", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21203.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21203", }, { cve: "CVE-2024-21204", references: [ { category: "self", summary: "CVE-2024-21204", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21204.json", }, ], title: "CVE-2024-21204", }, { cve: "CVE-2024-21207", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21207", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21207.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21207", }, { cve: "CVE-2024-21209", product_status: { known_affected: [ "CSAFPID-1673440", "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21209", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21209.json", }, ], scores: [ { cvss_v3: { baseScore: 2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673440", "CSAFPID-249429", ], }, ], title: "CVE-2024-21209", }, { cve: "CVE-2024-21212", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21212", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21212.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21212", }, { cve: "CVE-2024-21213", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21213", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21213.json", }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21213", }, { cve: "CVE-2024-21218", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21218", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21218.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21218", }, { cve: "CVE-2024-21219", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21219", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21219.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21219", }, { cve: "CVE-2024-21230", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21230", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21230.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21230", }, { cve: "CVE-2024-21231", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21231", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21231.json", }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21231", }, { cve: "CVE-2024-21232", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21232", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21232.json", }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21232", }, { cve: "CVE-2024-21236", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21236", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21236.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21236", }, { cve: "CVE-2024-21237", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21237", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21237.json", }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21237", }, { cve: "CVE-2024-21238", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21238", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21238.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21238", }, { cve: "CVE-2024-21239", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21239", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21239.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21239", }, { cve: "CVE-2024-21241", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21241", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21241.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21241", }, { cve: "CVE-2024-21243", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21243", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21243.json", }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21243", }, { cve: "CVE-2024-21244", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21244", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21244.json", }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21244", }, { cve: "CVE-2024-21247", product_status: { known_affected: [ "CSAFPID-1673440", "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21247", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21247.json", }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1673440", "CSAFPID-249429", ], }, ], title: "CVE-2024-21247", }, { cve: "CVE-2024-21262", references: [ { category: "self", summary: "CVE-2024-21262", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21262.json", }, ], title: "CVE-2024-21262", }, { cve: "CVE-2024-21272", references: [ { category: "self", summary: "CVE-2024-21272", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21272.json", }, ], title: "CVE-2024-21272", }, { cve: "CVE-2024-28182", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Detection of Error Condition Without Action", title: "CWE-390", }, { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-764763", ], }, references: [ { category: "self", summary: "CVE-2024-28182", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-764763", ], }, ], title: "CVE-2024-28182", }, { cve: "CVE-2024-37371", cwe: { id: "CWE-130", name: "Improper Handling of Length Parameter Inconsistency", }, notes: [ { category: "other", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, ], references: [ { category: "self", summary: "CVE-2024-37371", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json", }, ], title: "CVE-2024-37371", }, { cve: "CVE-2024-39689", cwe: { id: "CWE-345", name: "Insufficient Verification of Data Authenticity", }, notes: [ { category: "other", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, ], references: [ { category: "self", summary: "CVE-2024-39689", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json", }, ], title: "CVE-2024-39689", }, ], }
ncsc-2024-0420
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:20
Modified
2024-10-17 13:20
Summary
Kwetsbaarheden verholpen in Oracle MySQL
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in MySQL.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om toegang te krijgen tot gevoelige gegevens in de database en deze mogelijk te manipuleren.
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-390
Detection of Error Condition Without Action
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-345
Insufficient Verification of Data Authenticity
CWE-190
Integer Overflow or Wraparound
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-20
Improper Input Validation
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Oracle heeft kwetsbaarheden verholpen in MySQL.", title: "Feiten", }, { category: "description", text: "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om toegang te krijgen tot gevoelige gegevens in de database en deze mogelijk te manipuleren.", title: "Interpretaties", }, { category: "description", text: "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Detection of Error Condition Without Action", title: "CWE-390", }, { category: "general", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, { category: "general", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "general", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "general", text: "Out-of-bounds Read", title: "CWE-125", }, { category: "general", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "general", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", url: "https://www.oracle.com/security-alerts/cpuoct2024.html", }, ], title: "Kwetsbaarheden verholpen in Oracle MySQL", tracking: { current_release_date: "2024-10-17T13:20:42.437738Z", id: "NCSC-2024-0420", initial_release_date: "2024-10-17T13:20:42.437738Z", revision_history: [ { date: "2024-10-17T13:20:42.437738Z", number: "0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "mysql_cluster", product: { name: "mysql_cluster", product_id: "CSAFPID-764289", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_connectors", product: { name: "mysql_connectors", product_id: "CSAFPID-221160", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql", product: { name: "mysql", product_id: "CSAFPID-249429", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_enterprise_backup", product: { name: "mysql_enterprise_backup", product_id: "CSAFPID-1673522", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_enterprise_backup:9.0.1_and_prior:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_enterprise_monitor", product: { name: "mysql_enterprise_monitor", product_id: "CSAFPID-764290", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_server", product: { name: "mysql_server", product_id: "CSAFPID-504250", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_workbench", product: { name: "mysql_workbench", product_id: "CSAFPID-764763", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "mysql_client", product: { name: "mysql_client", product_id: "CSAFPID-1673440", product_identification_helper: { cpe: "cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "oracle", }, ], }, vulnerabilities: [ { cve: "CVE-2023-45853", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, notes: [ { category: "other", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], product_status: { known_affected: [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-764763", ], }, references: [ { category: "self", summary: "CVE-2023-45853", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45853.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-764763", ], }, ], title: "CVE-2023-45853", }, { cve: "CVE-2024-5535", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, ], product_status: { known_affected: [ "CSAFPID-1673522", ], }, references: [ { category: "self", summary: "CVE-2024-5535", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673522", ], }, ], title: "CVE-2024-5535", }, { cve: "CVE-2024-7264", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "other", text: "Out-of-bounds Read", title: "CWE-125", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-1673522", ], }, references: [ { category: "self", summary: "CVE-2024-7264", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673522", ], }, ], title: "CVE-2024-7264", }, { cve: "CVE-2024-21193", references: [ { category: "self", summary: "CVE-2024-21193", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21193.json", }, ], title: "CVE-2024-21193", }, { cve: "CVE-2024-21194", references: [ { category: "self", summary: "CVE-2024-21194", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21194.json", }, ], title: "CVE-2024-21194", }, { cve: "CVE-2024-21196", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21196", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21196.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21196", }, { cve: "CVE-2024-21197", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21197", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21197.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21197", }, { cve: "CVE-2024-21198", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21198", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21198.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21198", }, { cve: "CVE-2024-21199", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21199", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21199.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21199", }, { cve: "CVE-2024-21200", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21200", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21200.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21200", }, { cve: "CVE-2024-21201", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21201", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21201.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21201", }, { cve: "CVE-2024-21203", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21203", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21203.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21203", }, { cve: "CVE-2024-21204", references: [ { category: "self", summary: "CVE-2024-21204", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21204.json", }, ], title: "CVE-2024-21204", }, { cve: "CVE-2024-21207", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21207", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21207.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21207", }, { cve: "CVE-2024-21209", product_status: { known_affected: [ "CSAFPID-1673440", "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21209", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21209.json", }, ], scores: [ { cvss_v3: { baseScore: 2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673440", "CSAFPID-249429", ], }, ], title: "CVE-2024-21209", }, { cve: "CVE-2024-21212", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21212", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21212.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21212", }, { cve: "CVE-2024-21213", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21213", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21213.json", }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21213", }, { cve: "CVE-2024-21218", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21218", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21218.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21218", }, { cve: "CVE-2024-21219", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21219", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21219.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21219", }, { cve: "CVE-2024-21230", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21230", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21230.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21230", }, { cve: "CVE-2024-21231", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21231", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21231.json", }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21231", }, { cve: "CVE-2024-21232", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21232", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21232.json", }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21232", }, { cve: "CVE-2024-21236", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21236", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21236.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21236", }, { cve: "CVE-2024-21237", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21237", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21237.json", }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21237", }, { cve: "CVE-2024-21238", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21238", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21238.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21238", }, { cve: "CVE-2024-21239", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21239", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21239.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21239", }, { cve: "CVE-2024-21241", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21241", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21241.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21241", }, { cve: "CVE-2024-21243", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21243", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21243.json", }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21243", }, { cve: "CVE-2024-21244", product_status: { known_affected: [ "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21244", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21244.json", }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-249429", ], }, ], title: "CVE-2024-21244", }, { cve: "CVE-2024-21247", product_status: { known_affected: [ "CSAFPID-1673440", "CSAFPID-249429", ], }, references: [ { category: "self", summary: "CVE-2024-21247", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21247.json", }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1673440", "CSAFPID-249429", ], }, ], title: "CVE-2024-21247", }, { cve: "CVE-2024-21262", references: [ { category: "self", summary: "CVE-2024-21262", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21262.json", }, ], title: "CVE-2024-21262", }, { cve: "CVE-2024-21272", references: [ { category: "self", summary: "CVE-2024-21272", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21272.json", }, ], title: "CVE-2024-21272", }, { cve: "CVE-2024-28182", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Detection of Error Condition Without Action", title: "CWE-390", }, { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-764763", ], }, references: [ { category: "self", summary: "CVE-2024-28182", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-764763", ], }, ], title: "CVE-2024-28182", }, { cve: "CVE-2024-37371", cwe: { id: "CWE-130", name: "Improper Handling of Length Parameter Inconsistency", }, notes: [ { category: "other", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, ], references: [ { category: "self", summary: "CVE-2024-37371", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json", }, ], title: "CVE-2024-37371", }, { cve: "CVE-2024-39689", cwe: { id: "CWE-345", name: "Insufficient Verification of Data Authenticity", }, notes: [ { category: "other", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, ], references: [ { category: "self", summary: "CVE-2024-39689", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json", }, ], title: "CVE-2024-39689", }, ], }
ghsa-hgjp-83m4-h4fj
Vulnerability from github
Published
2024-10-15 21:30
Modified
2024-10-24 16:45
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.7 (High) - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
7.7 (High) - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Summary
MySQL Connector/Python connector takeover vulnerability
Details
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
{ affected: [ { package: { ecosystem: "PyPI", name: "mysql-connector-python", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "9.1.0", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2024-21272", ], database_specific: { cwe_ids: [ "CWE-89", ], github_reviewed: true, github_reviewed_at: "2024-10-24T16:45:37Z", nvd_published_at: "2024-10-15T20:15:18Z", severity: "HIGH", }, details: "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).", id: "GHSA-hgjp-83m4-h4fj", modified: "2024-10-24T16:45:37Z", published: "2024-10-15T21:30:39Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-21272", }, { type: "WEB", url: "https://github.com/mysql/mysql-connector-python/commit/e6b927af06e8a85bd3754f602df96a5592b4558c", }, { type: "PACKAGE", url: "https://github.com/mysql/mysql-connector-python", }, { type: "WEB", url: "https://www.oracle.com/security-alerts/cpuoct2024.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, { score: "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", type: "CVSS_V4", }, ], summary: "MySQL Connector/Python connector takeover vulnerability", }
fkie_cve-2024-21272
Vulnerability from fkie_nvd
Published
2024-10-15 20:15
Modified
2024-10-21 16:14
Severity ?
Summary
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
References
▼ | URL | Tags | |
---|---|---|---|
secalert_us@oracle.com | https://www.oracle.com/security-alerts/cpuoct2024.html | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", matchCriteriaId: "BD1DFA06-03A1-41E6-BF09-156C1084A811", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).", }, { lang: "es", value: "Vulnerabilidad en el producto MySQL Connectors de Oracle MySQL (componente: Connector/Python). Las versiones compatibles afectadas son 9.0.0 y anteriores. Esta vulnerabilidad, que es difícil de explotar, permite que un atacante con pocos privilegios y acceso a la red a través de múltiples protocolos ponga en peligro MySQL Connectors. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la toma de control de MySQL Connectors. Puntuación base CVSS 3.1: 7,5 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).", }, ], id: "CVE-2024-21272", lastModified: "2024-10-21T16:14:28.780", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 5.9, source: "secalert_us@oracle.com", type: "Primary", }, ], }, published: "2024-10-15T20:15:18.963", references: [ { source: "secalert_us@oracle.com", tags: [ "Vendor Advisory", ], url: "https://www.oracle.com/security-alerts/cpuoct2024.html", }, ], sourceIdentifier: "secalert_us@oracle.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-306", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
gsd-2024-21272
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
Aliases
{ GSD: { alias: "CVE-2024-21272", id: "GSD-2024-21272", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2024-21272", ], id: "GSD-2024-21272", modified: "2023-12-13T01:21:42.638870Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2024-21272", STATE: "RESERVED", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", }, ], }, }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.