Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1043-1 | mysql-5.5 security update |
![]() |
DSA-3922-1 | mysql-5.5 security update |
![]() |
DSA-3944-1 | mariadb-10.0 security update |
![]() |
DSA-3955-1 | mariadb-10.1 security update |
![]() |
EUVD-2017-12770 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N). |
![]() |
USN-3357-1 | MySQL vulnerabilities |
![]() |
USN-3357-2 | MySQL vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 07 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2024-10-04T17:01:05.252Z
Reserved: 2016-12-06T00:00:00
Link: CVE-2017-3653

Updated: 2024-08-05T14:39:39.638Z

Status : Deferred
Published: 2017-08-08T15:29:08.757
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-3653


No data.