SB2018032816 - Red Hat update for mysql
Published: March 28, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 14 secuirty vulnerabilities.
1) Improper Access Control (CVE-ID: CVE-2018-2562)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to modify certain data on the system and perform a denial of service (DoS) attack.
2) Improper input validation (CVE-ID: CVE-2018-2573)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
3) Improper input validation (CVE-ID: CVE-2018-2583)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
4) Improper input validation (CVE-ID: CVE-2018-2590)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
5) Improper input validation (CVE-ID: CVE-2018-2591)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
6) Improper Access Control (CVE-ID: CVE-2018-2612)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify or delete certain data in database.
7) Improper input validation (CVE-ID: CVE-2018-2622)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
8) Improper input validation (CVE-ID: CVE-2018-2640)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
9) Information Exposure (CVE-ID: CVE-2018-2645)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to gain access to sensitive information.
10) Improper Access Control (CVE-ID: CVE-2018-2647)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify certain data on the system and perform a denial of service (DoS) attack.
11) Improper input validation (CVE-ID: CVE-2018-2665)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
12) Improper input validation (CVE-ID: CVE-2018-2668)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
13) Improper input validation (CVE-ID: CVE-2018-2696)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote unauthenticated attacker can exploit the vulnerability to perform a denial of service attack.
14) Improper input validation (CVE-ID: CVE-2018-2703)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
Remediation
Install update from vendor's website.