SB2018032816 - Red Hat update for mysql



SB2018032816 - Red Hat update for mysql

Published: March 28, 2018

Security Bulletin ID SB2018032816
Severity
Medium
Patch available
YES
Number of vulnerabilities 14
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 7% Low 93%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 14 secuirty vulnerabilities.


1) Improper Access Control (CVE-ID: CVE-2018-2562)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to modify certain data on the system and perform a denial of service (DoS) attack.


2) Improper input validation (CVE-ID: CVE-2018-2573)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


3) Improper input validation (CVE-ID: CVE-2018-2583)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


4) Improper input validation (CVE-ID: CVE-2018-2590)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


5) Improper input validation (CVE-ID: CVE-2018-2591)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.


6) Improper Access Control (CVE-ID: CVE-2018-2612)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify or delete certain data in database.


7) Improper input validation (CVE-ID: CVE-2018-2622)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


8) Improper input validation (CVE-ID: CVE-2018-2640)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


9) Information Exposure (CVE-ID: CVE-2018-2645)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to gain access to sensitive information.


10) Improper Access Control (CVE-ID: CVE-2018-2647)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify certain data on the system and perform a denial of service (DoS) attack.


11) Improper input validation (CVE-ID: CVE-2018-2665)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


12) Improper input validation (CVE-ID: CVE-2018-2668)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


13) Improper input validation (CVE-ID: CVE-2018-2696)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote unauthenticated attacker can exploit the vulnerability to perform a denial of service attack.


14) Improper input validation (CVE-ID: CVE-2018-2703)

The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.


Remediation

Install update from vendor's website.