Vulnerability Name:

CVE-2019-2503 (CCN-155817)

Assigned:2018-12-14
Published:2019-01-15
Updated:2022-08-04
Summary:Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).
CVSS v3 Severity:6.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H)
5.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): High
6.4 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H)
5.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): High
6.4 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H)
5.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:3.8 Low (CVSS v2 Vector: AV:A/AC:M/Au:S/C:P/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Partial
5.9 Medium (CCN CVSS v2 Vector: AV:A/AC:H/Au:S/C:C/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Other
References:Source: MITRE
Type: CNA
CVE-2019-2503

Source: CCN
Type: Oracle CPUJan2019
Oracle Critical Patch Update Advisory - January 2019

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Source: BID
Type: VDB Entry, Third Party Advisory
106626

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1258

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2327

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2484

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2511

Source: XF
Type: UNKNOWN
oracle-cpujan2019-cve20192503(155817)

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20190118-0002/

Source: UBUNTU
Type: Third Party Advisory
USN-3867-1

Source: CCN
Type: IBM Security Bulletin 883622 (Security Guardium)
IBM Security Guardium is affected by Oracle MySQL vulnerabilities

Vulnerable Configuration:Configuration 1:
  • cpe:/a:oracle:mysql:*:*:*:*:*:*:*:* (Version >= 5.6.0 and <= 5.6.42)
  • OR cpe:/a:oracle:mysql:*:*:*:*:*:*:*:* (Version >= 5.7.0 and <= 5.7.24)
  • OR cpe:/a:oracle:mysql:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.0.13)

  • Configuration 2:
  • cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.0.0 and < 10.0.37)
  • OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 5.5.0 and < 5.5.62)
  • OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.3.0 and < 10.3.10)
  • OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.2.0 and < 10.2.18)
  • OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.1.0 and < 10.1.36)

  • Configuration 3:
  • cpe:/a:netapp:snapcenter:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* (Version >= 7.3
  • OR cpe:/a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* (Version >= 9.5

  • Configuration 4:
  • cpe:/o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*

  • Configuration 5:
  • cpe:/o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:mysql:8.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.6.42:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql:5.7.24:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:security_guardium:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:10.6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20192503
    V
    CVE-2019-2503
    2022-09-02
    oval:org.opensuse.security:def:3491
    P
    ft2demos-2.6.3-7.15.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:95121
    P
    libmariadbd-devel-10.6.7-150400.1.4 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:112683
    P
    libmariadbd-devel-10.6.4-2.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:106162
    P
    libmariadbd-devel-10.6.4-2.1 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:63342
    P
    libmariadbd-devel-10.5.8-1.5 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:2253
    P
    libmariadbd-devel-10.5.8-1.5 on GA media (Moderate)
    2021-08-10
    oval:com.redhat.rhsa:def:20192511
    P
    RHSA-2019:2511: mysql:8.0 security update (Important)
    2019-08-15
    oval:com.redhat.rhsa:def:20192327
    P
    RHSA-2019:2327: mariadb security and bug fix update (Moderate)
    2019-08-06
    oval:com.ubuntu.xenial:def:201925030000000
    V
    CVE-2019-2503 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-01-16
    oval:com.ubuntu.bionic:def:20192503000
    V
    CVE-2019-2503 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-01-16
    oval:com.ubuntu.disco:def:201925030000000
    V
    CVE-2019-2503 on Ubuntu 19.04 (disco) - medium.
    2019-01-16
    oval:com.ubuntu.cosmic:def:20192503000
    V
    CVE-2019-2503 on Ubuntu 18.10 (cosmic) - medium.
    2019-01-16
    oval:com.ubuntu.cosmic:def:201925030000000
    V
    CVE-2019-2503 on Ubuntu 18.10 (cosmic) - medium.
    2019-01-16
    oval:com.ubuntu.trusty:def:20192503000
    V
    CVE-2019-2503 on Ubuntu 14.04 LTS (trusty) - medium.
    2019-01-16
    oval:com.ubuntu.bionic:def:201925030000000
    V
    CVE-2019-2503 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-01-16
    oval:com.ubuntu.xenial:def:20192503000
    V
    CVE-2019-2503 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-01-16
    BACK
    oracle mysql *
    oracle mysql *
    oracle mysql *
    mariadb mariadb *
    mariadb mariadb *
    mariadb mariadb *
    mariadb mariadb *
    mariadb mariadb *
    netapp snapcenter -
    netapp oncommand workflow automation -
    netapp oncommand insight -
    netapp active iq unified manager *
    netapp active iq unified manager *
    canonical ubuntu linux 18.04
    canonical ubuntu linux 18.10
    canonical ubuntu linux 16.04
    redhat enterprise linux desktop 7.0
    redhat enterprise linux workstation 7.0
    redhat enterprise linux server 7.0
    redhat enterprise linux desktop 8.0
    redhat enterprise linux workstation 8.0
    redhat enterprise linux server 8.0
    redhat enterprise linux eus 8.1
    redhat enterprise linux eus 8.2
    redhat enterprise linux server tus 8.2
    redhat enterprise linux server tus 8.6
    redhat enterprise linux server aus 8.6
    redhat enterprise linux eus 8.6
    redhat enterprise linux eus 8.4
    redhat enterprise linux server aus 8.2
    redhat enterprise linux server aus 8.4
    redhat enterprise linux server tus 8.4
    oracle mysql 8.0.13
    oracle mysql 5.6.42
    oracle mysql 5.7.24
    ibm security guardium 10.0
    ibm security guardium 10.6