Vulnerability Name: | CVE-2012-5614 (CCN-80434) | ||||||||||||||||||||
Assigned: | 2012-12-01 | ||||||||||||||||||||
Published: | 2012-12-01 | ||||||||||||||||||||
Updated: | 2022-08-29 | ||||||||||||||||||||
Summary: | Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements. | ||||||||||||||||||||
CVSS v3 Severity: | 3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P) 3.6 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:U/RC:UR)
3.6 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:U/RC:UR)
3.6 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:U/RC:UR)
| ||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-5614 Source: CCN Type: MySQL Web site MySQL Source: CCN Type: Packetstorm Security Website Oracle MySQL 5.5.19-log Denial Of Service Source: CCN Type: RHSA-2013-0772 Important: mysql security update Source: REDHAT Type: Third Party Advisory RHSA-2013:0772 Source: FULLDISC Type: Exploit, Mailing List, Third Party Advisory 20121201 MySQL Denial of Service Zeroday PoC Source: CCN Type: SA51427 Oracle MySQL Server Multiple Vulnerabilities Source: SECUNIA Type: Not Applicable 53372 Source: GENTOO Type: Third Party Advisory GLSA-201308-06 Source: MANDRIVA Type: Broken Link MDVSA-2013:150 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20121202 Re: Re: [Full-disclosure] MySQL (Linux) Stack based buffer overrun PoC Zeroday Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20121202 Re: Re: [Full-disclosure] MySQL (Linux) Stack based buffer overrun PoC Zeroday Source: CCN Type: Oracle Web site Oracle Critical Patch Update Advisory - April 2013 Source: CONFIRM Type: Vendor Advisory http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html Source: CCN Type: OSVDB ID: 88065 Oracle MySQL Server COM_BINLOG_DUMP Invalid Data Handling DoS Source: CCN Type: BID-56776 Oracle MySQL CVE-2012-5614 Denial of Service Vulnerability Source: SECTRACK Type: Broken Link, Third Party Advisory, VDB Entry 1027829 Source: MISC Type: Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=882607 Source: XF Type: UNKNOWN mysql-combinlogdump-dos(80434) Source: MISC Type: Broken Link, Patch https://mariadb.atlassian.net/browse/MDEV-3910 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [12-02-2012] | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |