// For flags

CVE-2016-6664

MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'root' System User Privilege Escalation

Severity Score

7.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.

mysqld_safe en Oracle MySQL hasta la versión 5.5.51, 5.6.x hasta la versión 5.6.32 y 5.7.x hasta la versión 5.7.14; MariaDB; Percona Server en versiones anteriores a 5.5.51-38.2, 5.6.x en versiones anteriores a 5.6.32-78-1 y 5.7.x en versiones anteriores a 5.7.14-8 y Percona XtraDB Cluster en versiones anteriores a 5.5.41-37.0, 5.6.x en versiones anteriores a 5.6.32-25.17 y 5.7.x en versiones anteriores a 5.7.14-26.17, cuando usa un inicio de sesión basada en archivo, permite a usuarios locales con acceso a la cuenta mysql obtener privilegios de root a través de un ataque de enlace simbólico en errores de acceso y posiblemente otros archivos.

A flaw was found in the way the mysqld_safe script handled creation of error log file. The mysql operating system user could use this flaw to escalate their privileges to root.

MySQL-based databases including MySQL, MariaDB and PerconaDB are affected by a privilege escalation vulnerability which can let attackers who have gained access to mysql system user to further escalate their privileges to root user allowing them to fully compromise the system. The vulnerability stems from unsafe file handling of error logs and other files.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Local
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-08-10 CVE Reserved
  • 2016-11-02 CVE Published
  • 2023-05-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Mysql
Search vendor "Oracle" for product "Mysql"
>= 5.5.0 <= 5.5.51
Search vendor "Oracle" for product "Mysql" and version " >= 5.5.0 <= 5.5.51"
-
Affected
Oracle
Search vendor "Oracle"
Mysql
Search vendor "Oracle" for product "Mysql"
>= 5.6.0 <= 5.6.32
Search vendor "Oracle" for product "Mysql" and version " >= 5.6.0 <= 5.6.32"
-
Affected
Oracle
Search vendor "Oracle"
Mysql
Search vendor "Oracle" for product "Mysql"
>= 5.7.0 <= 5.7.14
Search vendor "Oracle" for product "Mysql" and version " >= 5.7.0 <= 5.7.14"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 5.5.0 < 5.5.54
Search vendor "Mariadb" for product "Mariadb" and version " >= 5.5.0 < 5.5.54"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.0.0 < 10.0.29
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.0.0 < 10.0.29"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.1.0 < 10.1.21
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.1.0 < 10.1.21"
-
Affected
Percona
Search vendor "Percona"
Percona Server
Search vendor "Percona" for product "Percona Server"
>= 5.5 < 5.5.51-38.2
Search vendor "Percona" for product "Percona Server" and version " >= 5.5 < 5.5.51-38.2"
-
Affected
Percona
Search vendor "Percona"
Percona Server
Search vendor "Percona" for product "Percona Server"
>= 5.6 < 5.6.32-78.1
Search vendor "Percona" for product "Percona Server" and version " >= 5.6 < 5.6.32-78.1"
-
Affected
Percona
Search vendor "Percona"
Percona Server
Search vendor "Percona" for product "Percona Server"
>= 5.7 < 5.7.14-8
Search vendor "Percona" for product "Percona Server" and version " >= 5.7 < 5.7.14-8"
-
Affected
Percona
Search vendor "Percona"
Xtradb Cluster
Search vendor "Percona" for product "Xtradb Cluster"
>= 5.5 < 5.5.41-37.0
Search vendor "Percona" for product "Xtradb Cluster" and version " >= 5.5 < 5.5.41-37.0"
-
Affected
Percona
Search vendor "Percona"
Xtradb Cluster
Search vendor "Percona" for product "Xtradb Cluster"
>= 5.6 < 5.6.32-25.17
Search vendor "Percona" for product "Xtradb Cluster" and version " >= 5.6 < 5.6.32-25.17"
-
Affected
Percona
Search vendor "Percona"
Xtradb Cluster
Search vendor "Percona" for product "Xtradb Cluster"
>= 5.7 < 5.7.14-26.17
Search vendor "Percona" for product "Xtradb Cluster" and version " >= 5.7 < 5.7.14-26.17"
-
Affected