CVE-2017-3464

Source
https://cve.org/CVERecord?id=CVE-2017-3464
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3464.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2017-3464
Downstream
Related
Published
2017-04-24T19:59:01.627Z
Modified
2026-05-15T12:03:48.490945910Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

Database specific
{
    "unresolved_ranges": [
        {
            "vendor_product": "debian:debian_linux",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ],
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "redhat:enterprise_linux_desktop",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ],
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "redhat:enterprise_linux_server",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ],
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
            ]
        },
        {
            "vendor_product": "redhat:enterprise_linux_server_aus",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.4"
                },
                {
                    "last_affected": "7.6"
                }
            ],
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
            ]
        },
        {
            "vendor_product": "redhat:enterprise_linux_server_eus",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.4"
                },
                {
                    "last_affected": "7.5"
                },
                {
                    "last_affected": "7.6"
                }
            ],
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
            ]
        },
        {
            "vendor_product": "redhat:enterprise_linux_server_tus",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ],
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
            ]
        },
        {
            "vendor_product": "redhat:enterprise_linux_workstation",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ],
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
            ]
        }
    ]
}
References

Affected packages