CVE-2021-35593
Oracle MySQL Cluster Data Node Stack-based Buffer Overflow Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
Una vulnerabilidad en el producto MySQL Cluster de Oracle MySQL (componente: Cluster: General). Las versiones compatibles que están afectadas son 7.4.33 y anteriores, 7.5.23 y anteriores, 7.6.19 y anteriores y 8.0.26 y anteriores. Una vulnerabilidad difícil de explotar permite a un atacante muy privilegiado con acceso al segmento de comunicación física conectado al hardware donde se ejecuta el MySQL Cluster comprometer a MySQL Cluster. Los ataques con éxito requieren una interacción humana de una persona diferente del atacante. Los ataques con éxito de esta vulnerabilidad pueden resultar en la toma de control de MySQL Cluster. CVSS 3.1 Puntuación Base 6.3 (impactos en la Confidencialidad, Integridad y Disponibilidad). Vector CVSS: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle MySQL Cluster. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the processing of Data Node jobs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2021-06-28 CVE Reserved
- 2021-10-20 CVE Published
- 2024-09-25 CVE Updated
- 2024-11-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20211022-0003 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1229 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.oracle.com/security-alerts/cpuoct2021.html | 2021-10-26 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Mysql Cluster Search vendor "Oracle" for product "Mysql Cluster" | >= 7.4.0 <= 7.4.33 Search vendor "Oracle" for product "Mysql Cluster" and version " >= 7.4.0 <= 7.4.33" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Mysql Cluster Search vendor "Oracle" for product "Mysql Cluster" | >= 7.5.0 <= 7.5.23 Search vendor "Oracle" for product "Mysql Cluster" and version " >= 7.5.0 <= 7.5.23" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Mysql Cluster Search vendor "Oracle" for product "Mysql Cluster" | >= 7.6.0 <= 7.6.19 Search vendor "Oracle" for product "Mysql Cluster" and version " >= 7.6.0 <= 7.6.19" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Mysql Cluster Search vendor "Oracle" for product "Mysql Cluster" | >= 8.0.0 <= 8.0.26 Search vendor "Oracle" for product "Mysql Cluster" and version " >= 8.0.0 <= 8.0.26" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Oncommand Insight Search vendor "Netapp" for product "Oncommand Insight" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Snapcenter Search vendor "Netapp" for product "Snapcenter" | - | - |
Affected
|