CVE-2016-2047

Source
https://cve.org/CVERecord?id=CVE-2016-2047
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2047.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-2047
Downstream
Related
Published
2016-01-27T20:59:05.610Z
Modified
2026-02-06T22:02:14.734043Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

The sslverifyserver_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."

References

Affected packages

Git / github.com/mariadb/server

Database specific

vanir_signatures
[
    {
        "signature_type": "Line",
        "source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
        "target": {
            "file": "sql/init.cc"
        },
        "id": "CVE-2016-2047-418dc194",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "147107641273993383240782259862025438176",
                "92010967798498701673315862426094756400",
                "327751778421770712387529959218426352739",
                "335366999246722941831157885595185343881",
                "273999841737195452499309953200498666375",
                "210517212316227742052728977697524822713"
            ]
        },
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
        "target": {
            "file": "mysys/my_static.c"
        },
        "id": "CVE-2016-2047-66b1a29e",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "24307595873147278150201970310353889821",
                "48675940072839761549793864817188524169",
                "216230675055673289190865619159493735368",
                "20652123376710344335504722831294169387"
            ]
        },
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
        "target": {
            "file": "sql/init.cc",
            "function": "unireg_init"
        },
        "id": "CVE-2016-2047-a534a020",
        "signature_version": "v1",
        "digest": {
            "function_hash": "311144189938665340085863602879392151383",
            "length": 449.0
        },
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
        "target": {
            "file": "plugin/daemon_example/daemon_example.cc"
        },
        "id": "CVE-2016-2047-cd5bea7a",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "167000630030318618717608062140112220235",
                "10642358439317725583287537405604680149",
                "162374108280077942150750980263312138467",
                "50163437060249974045566719846816540694"
            ]
        },
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "source": "https://github.com/mariadb/server/commit/90ea0145856338221803ebb9b446ed2a6e082412",
        "target": {
            "file": "include/my_sys.h"
        },
        "id": "CVE-2016-2047-dd6f816d",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "80280507170444425678090689408551056030",
                "186901013121802111627367647389618571691",
                "35090662641952932041522151791618716843",
                "119536087546367306015463964300481495175",
                "36459839600648900298056848002263452468"
            ]
        },
        "deprecated": false
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2047.json"

Git / github.com/mysql/mysql-server

Affected ranges

Type
GIT
Repo
https://github.com/mysql/mysql-server
Events

Affected versions

mysql-5.*
mysql-5.0.96
mysql-5.1.61
mysql-5.1.62
mysql-5.1.63
mysql-5.1.65
mysql-5.1.66
mysql-5.1.67
mysql-5.1.68
mysql-5.1.69
mysql-5.1.69-retag
mysql-5.1.70
mysql-5.1.71
mysql-5.1.72
mysql-5.1.73
mysql-5.1.74
mysql-5.1.75
mysql-5.1.76
mysql-5.1.77
mysql-5.5.20
mysql-5.5.21
mysql-5.5.22
mysql-5.5.23
mysql-5.5.24
mysql-5.5.25
mysql-5.5.25a
mysql-5.5.27
mysql-5.5.28
mysql-5.5.29
mysql-5.5.30
mysql-5.5.31
mysql-5.5.32
mysql-5.5.33
mysql-5.5.34
mysql-5.5.35
mysql-5.5.36
mysql-5.5.37
mysql-5.5.38
mysql-5.5.39
mysql-5.5.40
mysql-5.5.41
mysql-5.5.42
mysql-5.5.43
mysql-5.5.44
mysql-5.5.45
mysql-5.5.46

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2047.json"