CVE-2017-14481
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
In the MMM::Agent::Helpers::Network::send_arp function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.
En la función MMM::Agent::Helpers::Network::send_arp en MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (para Solaris), un mensaje de protocolo MMM especialmente manipulado puede provocar una inyección de comandos shell que resulte en la ejecución de comandos arbitrarios con los privilegios del proceso mmm\_agentd. Un atacante que pueda iniciar una sesión TCP con mmm_agentd puede desencadenar esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-09-13 CVE Reserved
- 2018-05-09 CVE Published
- 2024-03-16 EPSS Updated
- 2024-09-17 CVE Updated
- 2024-09-17 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0501 | 2024-09-17 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mysql-mmm Search vendor "Mysql-mmm" | Mysql Multi-master Replication Manager Search vendor "Mysql-mmm" for product "Mysql Multi-master Replication Manager" | 2.2.1 Search vendor "Mysql-mmm" for product "Mysql Multi-master Replication Manager" and version "2.2.1" | solaris |
Affected
|