Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.809372
Categoría:Databases
Título:Oracle MySQL Server <= 5.5.51 / 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Update (cpuoct2016) - Windows
Resumen:Oracle MySQL Server is prone to multiple vulnerabilities.
Descripción:Summary:
Oracle MySQL Server is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to multiple unspecified errors in the
'Server:GIS', 'Server:Federated', 'Server:Optimizer', 'Server:Types', 'Server:Error Handling' and
'Server:MyISAM' components.

Vulnerability Impact:
Successful exploitation of these vulnerabilities will allow remote
authenticated attackers to cause denial of service conditions and gain elevated privileges.

Affected Software/OS:
Oracle MySQL Server versions 5.5.51 and prior, 5.6 through 5.6.32 and 5.7 through 5.7.14.

Solution:
Updates are available. Please see the references for more information.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-3492
BugTraq ID: 93650
http://www.securityfocus.com/bid/93650
https://security.gentoo.org/glsa/201701-01
RedHat Security Advisories: RHSA-2016:2130
http://rhn.redhat.com/errata/RHSA-2016-2130.html
RedHat Security Advisories: RHSA-2016:2131
http://rhn.redhat.com/errata/RHSA-2016-2131.html
RedHat Security Advisories: RHSA-2016:2595
http://rhn.redhat.com/errata/RHSA-2016-2595.html
RedHat Security Advisories: RHSA-2016:2749
http://rhn.redhat.com/errata/RHSA-2016-2749.html
RedHat Security Advisories: RHSA-2016:2927
http://rhn.redhat.com/errata/RHSA-2016-2927.html
RedHat Security Advisories: RHSA-2016:2928
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.securitytracker.com/id/1037050
Common Vulnerability Exposure (CVE) ID: CVE-2016-5626
BugTraq ID: 93638
http://www.securityfocus.com/bid/93638
Common Vulnerability Exposure (CVE) ID: CVE-2016-5629
BugTraq ID: 93668
http://www.securityfocus.com/bid/93668
Common Vulnerability Exposure (CVE) ID: CVE-2016-5616
Common Vulnerability Exposure (CVE) ID: CVE-2016-5617
Common Vulnerability Exposure (CVE) ID: CVE-2016-8283
BugTraq ID: 93737
http://www.securityfocus.com/bid/93737
Common Vulnerability Exposure (CVE) ID: CVE-2016-6663
BugTraq ID: 92911
http://www.securityfocus.com/bid/92911
BugTraq ID: 93614
http://www.securityfocus.com/bid/93614
https://www.exploit-db.com/exploits/40678/
http://seclists.org/fulldisclosure/2016/Nov/4
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
http://www.openwall.com/lists/oss-security/2016/10/25/4
RedHat Security Advisories: RHSA-2017:0184
http://rhn.redhat.com/errata/RHSA-2017-0184.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-6664
BugTraq ID: 93612
http://www.securityfocus.com/bid/93612
Bugtraq: 20161104 MySQL / MariaDB / PerconaDB - Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 ) (Google Search)
http://www.securityfocus.com/archive/1/539695/100/0/threaded
Debian Security Information: DSA-3770 (Google Search)
http://www.debian.org/security/2017/dsa-3770
https://www.exploit-db.com/exploits/40679/
https://security.gentoo.org/glsa/201702-18
http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
RedHat Security Advisories: RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2192
RedHat Security Advisories: RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0279
RedHat Security Advisories: RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:0574
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.