// For flags

CVE-2017-3599

MySQL < 5.6.35 / < 5.7.17 - Integer Overflow

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet.

Se ha encontrado una vulnerabilidad en el componente MySQL Server de Oracle MySQL (subcomponente: Server: Pluggable Auth). Las versiones compatibles que se ven afectadas son versión 5.6.35 y anteriores y versión 5.7.17 y anteriores. La vulnerabilidad fácilmente "explotable" permite que un atacante no autenticado con acceso a la red por medio de múltiples protocolos ponga en peligro el servidor MySQL. Los ataques con éxito de esta vulnerabilidad pueden resultar en una capacidad no autorizada para generar una suspensión o un bloqueo repetible con frecuencia (DoS completo) de MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. NOTA: la información anterior es de la CPU de abril de 2017. Oracle no ha comentado sobre las afirmaciones de terceros de que este problema es un desbordamiento de enteros en sql/auth/sql_authentication.cc que permite a los atacantes remotos generar una Denegación de Servicio (DoS) por medio de un paquete de autenticación creado.

An integer overflow flaw leading to a buffer overflow was found in the way MySQL parsed connection handshake packets. An unauthenticated remote attacker with access to the MySQL port could use this flaw to crash the mysqld daemon.

MySQL versions 5.6.35 and below and 5.7.17 and below suffer from an integer overflow vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2016-12-06 CVE Reserved
  • 2017-04-18 First Exploit
  • 2017-04-24 CVE Published
  • 2024-10-04 CVE Updated
  • 2024-11-06 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-190: Integer Overflow or Wraparound
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Mysql
Search vendor "Oracle" for product "Mysql"
>= 5.6.0 <= 5.6.35
Search vendor "Oracle" for product "Mysql" and version " >= 5.6.0 <= 5.6.35"
-
Affected
Oracle
Search vendor "Oracle"
Mysql
Search vendor "Oracle" for product "Mysql"
>= 5.7.0 <= 5.7.17
Search vendor "Oracle" for product "Mysql" and version " >= 5.7.0 <= 5.7.17"
-
Affected