CVE-2016-0546

Severity

72%

Complexity

39%

Confidentiality

165%

Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.

Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.

CVSS 2.0 Base Score 7.2. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C).

Overview

First reported 9 years ago

2016-01-21 03:01:00

Last updated 5 years ago

2019-12-27 16:08:00

Affected Software

Canonical Ubuntu Linux 12.04 LTS

12.04

Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)

14.04

Canonical Ubuntu Linux 15.04

15.04

Canonical Ubuntu Linux 15.10

15.10

Red Hat Enterprise Linux 6.0

6.0

Red Hat Enterprise Linux (RHEL) 7.0 (7)

7.0

Oracle MySQL -

Oracle Solaris 11.3

11.3

openSUSE Leap 42.1

42.1

OpenSUSE 13.2

13.2

RedHat Enterprise Linux Desktop 7.0

7.0

RedHat Enterprise Linux HPC Node 7.0

7.0

Red Hat Enterprise Linux HPC Node EUS 7.2

7.2

RedHat Enterprise Linux Server 7.0

7.0

Red Hat Enterprise Linux Server AUS 7.2

7.2

Red Hat Enterprise Linux Server EUS 7.2

7.2

RedHat Enterprise Linux Workstation 7.0

7.0

Debian Linux 8.0 (Jessie)

8.0

References

openSUSE-SU-2016:0367

Third Party Advisory

openSUSE-SU-2016:0377

Mailing List, Third Party Advisory

SUSE-SU-2016:1619

Mailing List, Third Party Advisory

SUSE-SU-2016:1620

Mailing List, Third Party Advisory

openSUSE-SU-2016:1664

Mailing List, Third Party Advisory

openSUSE-SU-2016:1686

Third Party Advisory

RHSA-2016:0534

Third Party Advisory

RHSA-2016:0705

Third Party Advisory

RHSA-2016:1480

Third Party Advisory

RHSA-2016:1481

Third Party Advisory

DSA-3453

Patch, Third Party Advisory

DSA-3459

Third Party Advisory

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Vendor Advisory

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Vendor Advisory

http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

Vendor Advisory

81066

Third Party Advisory, VDB Entry

1034708

Third Party Advisory, VDB Entry

USN-2881-1

Third Party Advisory

RHSA-2016:1132

Third Party Advisory

https://bugzilla.redhat.com/show_bug.cgi?id=1301493

Issue Tracking, Third Party Advisory

https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html

Vendor Advisory

https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html

Vendor Advisory

https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f

Third Party Advisory

https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/

Vendor Advisory

https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/

Vendor Advisory

https://mariadb.com/kb/en/mdb-10023-rn/

Vendor Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.