Vulnerabilities > CVE-2018-3080
Summary
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 | |
Application | 4 |
Nessus
NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2018-1_0-0170.NASL description An update of 'mysql' packages of Photon OS has been released. last seen 2019-02-08 modified 2019-02-07 plugin id 111948 published 2018-08-17 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=111948 title Photon OS 1.0: Mysql PHSA-2018-1.0-0170 (deprecated) code # # (C) Tenable Network Security, Inc. # # @DEPRECATED@ # # Disabled on 2/7/2019 # # The descriptive text and package checks in this plugin were # extracted from VMware Security Advisory PHSA-2018-1.0-0170. The text # itself is copyright (C) VMware, Inc. include("compat.inc"); if (description) { script_id(111948); script_version("1.2"); script_cvs_date("Date: 2019/02/07 18:59:50"); script_cve_id( "CVE-2018-3054", "CVE-2018-3056", "CVE-2018-3058", "CVE-2018-3060", "CVE-2018-3061", "CVE-2018-3062", "CVE-2018-3064", "CVE-2018-3065", "CVE-2018-3067", "CVE-2018-3070", "CVE-2018-3071", "CVE-2018-3073", "CVE-2018-3074", "CVE-2018-3075", "CVE-2018-3077", "CVE-2018-3078", "CVE-2018-3079", "CVE-2018-3080", "CVE-2018-3081" ); script_name(english:"Photon OS 1.0: Mysql PHSA-2018-1.0-0170 (deprecated)"); script_summary(english:"Checks the rpm output for the updated packages."); script_set_attribute(attribute:"synopsis", value: "This plugin has been deprecated."); script_set_attribute(attribute:"description", value: "An update of 'mysql' packages of Photon OS has been released."); # https://github.com/vmware/photon/wiki/Security-Updates-1.0-170 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?60aa7fd3"); script_set_attribute(attribute:"solution", value:"n/a."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-3060"); script_set_attribute(attribute:"patch_publication_date", value:"2018/08/02"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/17"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:vmware:photonos:mysql"); script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:photonos:1.0"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"PhotonOS Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/PhotonOS/release", "Host/PhotonOS/rpm-list"); exit(0); } exit(0, "This plugin has been deprecated."); include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/PhotonOS/release"); if (isnull(release) || release !~ "^VMware Photon") audit(AUDIT_OS_NOT, "PhotonOS"); if (release !~ "^VMware Photon (?:Linux|OS) 1\.0(\D|$)") audit(AUDIT_OS_NOT, "PhotonOS 1.0"); if (!get_kb_item("Host/PhotonOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "PhotonOS", cpu); flag = 0; pkgs = [ "mysql-5.7.23-1.ph1", "mysql-debuginfo-5.7.23-1.ph1", "mysql-devel-5.7.23-1.ph1" ]; foreach (pkg in pkgs) if (rpm_check(release:"PhotonOS-1.0", reference:pkg)) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mysql"); }
NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2018-1_0-0170_MYSQL.NASL description An update of the mysql package has been released. last seen 2020-03-17 modified 2019-02-07 plugin id 121869 published 2019-02-07 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/121869 title Photon OS 1.0: Mysql PHSA-2018-1.0-0170 code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from VMware Security Advisory PHSA-2018-1.0-0170. The text # itself is copyright (C) VMware, Inc. include('compat.inc'); if (description) { script_id(121869); script_version("1.2"); script_set_attribute(attribute:"plugin_modification_date", value:"2019/02/07"); script_cve_id( "CVE-2018-3054", "CVE-2018-3056", "CVE-2018-3058", "CVE-2018-3060", "CVE-2018-3061", "CVE-2018-3062", "CVE-2018-3064", "CVE-2018-3065", "CVE-2018-3067", "CVE-2018-3070", "CVE-2018-3071", "CVE-2018-3073", "CVE-2018-3074", "CVE-2018-3075", "CVE-2018-3077", "CVE-2018-3078", "CVE-2018-3079", "CVE-2018-3080", "CVE-2018-3081" ); script_name(english:"Photon OS 1.0: Mysql PHSA-2018-1.0-0170"); script_summary(english:"Checks the rpm output for the updated packages."); script_set_attribute(attribute:"synopsis", value: "The remote PhotonOS host is missing multiple security updates."); script_set_attribute(attribute:"description", value: "An update of the mysql package has been released."); script_set_attribute(attribute:"see_also", value:"https://github.com/vmware/photon/wiki/Security-Updates-1.0-170.md"); script_set_attribute(attribute:"solution", value: "Update the affected Linux packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-3064"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/08/02"); script_set_attribute(attribute:"patch_publication_date", value:"2018/08/02"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/02/07"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:vmware:photonos:mysql"); script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:photonos:1.0"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"PhotonOS Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/PhotonOS/release", "Host/PhotonOS/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/PhotonOS/release"); if (isnull(release) || release !~ "^VMware Photon") audit(AUDIT_OS_NOT, "PhotonOS"); if (release !~ "^VMware Photon (?:Linux|OS) 1\.0(\D|$)") audit(AUDIT_OS_NOT, "PhotonOS 1.0"); if (!get_kb_item("Host/PhotonOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "PhotonOS", cpu); flag = 0; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-debuginfo-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (rpm_check(release:"PhotonOS-1.0", reference:"mysql-devel-5.7.23-1.ph1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mysql"); }
NASL family Databases NASL id MYSQL_8_0_12.NASL description The version of MySQL running on the remote host is 8.0.x prior to 8.0.12. It is, therefore, affected by multiple vulnerabilities as noted in the July 2018 and July 2019 Critical Patch Update advisories. Please consult the CVRF details for the applicable CVEs for additional information. Note that Nessus has not tested for these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 111159 published 2018-07-20 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111159 title MySQL 8.0.x < 8.0.12 Multiple Vulnerabilities (Jul 2018 CPU) (Jul 2019 CPU) NASL family Databases NASL id MYSQL_8_0_12_RPM.NASL description The version of MySQL running on the remote host is 8.0.x prior to 8.0.12. It is, therefore, affected by multiple vulnerabilities as noted in the July 2018 Critical Patch Update advisory. Please consult the CVRF details for the applicable CVEs for additional information. Note that Nessus has not tested for these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 111160 published 2018-07-20 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111160 title MySQL 8.0.x < 8.0.12 Multiple Vulnerabilities (RPM Check) (July 2018 CPU) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_909BE51B9B3B11E8ADD2B499BAEBFEAF.NASL description Oracle reports : Multiple vulnerabilities have been disclosed by Oracle without further detail. CVSS scores 7.1 - 2.7 last seen 2020-06-01 modified 2020-06-02 plugin id 111596 published 2018-08-09 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111596 title FreeBSD : MySQL -- multiple vulnerabilities (909be51b-9b3b-11e8-add2-b499baebfeaf) NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2018-2_0-0079.NASL description An update of 'mysql' packages of Photon OS has been released. last seen 2019-02-08 modified 2019-02-07 plugin id 111963 published 2018-08-17 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=111963 title Photon OS 2.0: Mysql PHSA-2018-2.0-0079 (deprecated) NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2018-2_0-0079_MYSQL.NASL description An update of the mysql package has been released. last seen 2020-03-17 modified 2019-02-07 plugin id 121976 published 2019-02-07 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/121976 title Photon OS 2.0: Mysql PHSA-2018-2.0-0079
References
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/104772
- http://www.securityfocus.com/bid/104772
- http://www.securitytracker.com/id/1041294
- http://www.securitytracker.com/id/1041294
- https://security.netapp.com/advisory/ntap-20180726-0002/
- https://security.netapp.com/advisory/ntap-20180726-0002/