Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "canonical:ubuntu_linux",
"extracted_events": [
{
"last_affected": "12.04"
},
{
"last_affected": "14.04"
},
{
"last_affected": "16.04"
},
{
"last_affected": "18.04"
}
]
},
{
"cpes": [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "debian:debian_linux",
"extracted_events": [
{
"last_affected": "8.0"
},
{
"last_affected": "9.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_desktop",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_workstation",
"extracted_events": [
{
"last_affected": "7.0"
}
]
}
]
}{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.5.61"
},
{
"introduced": "10.0.0"
},
{
"fixed": "10.0.36"
},
{
"introduced": "10.1.0"
},
{
"fixed": "10.1.35"
},
{
"introduced": "10.2.0"
},
{
"fixed": "10.2.17"
},
{
"introduced": "10.3.0"
},
{
"fixed": "10.3.9"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-3058.json"
[
{
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "unpack_fields",
"file": "sql-common/client.c"
},
"source": "https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613",
"digest": {
"function_hash": "88964842003053574630259804416355278302",
"length": 3281.0
},
"signature_type": "Function",
"id": "CVE-2018-3058-054c046b"
},
{
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "cli_read_rows",
"file": "sql-common/client.c"
},
"source": "https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613",
"digest": {
"function_hash": "30804943894516639331708306752096632231",
"length": 2052.0
},
"signature_type": "Function",
"id": "CVE-2018-3058-404642c2"
},
{
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "sql-common/client.c"
},
"source": "https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613",
"digest": {
"threshold": 0.9,
"line_hashes": [
"78191142045503767829834019020932019650",
"250157719937173868004615858289264688140",
"312170375706132797718465719883724591296",
"15117071355854376419182426407334479680",
"140920309514825384561268578794081140775",
"130933521110411440899075290412605664940",
"28770826883863233939468445958714821618",
"49331132400223798885681869446783630656"
]
},
"signature_type": "Line",
"id": "CVE-2018-3058-c0d67519"
},
{
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "ha_sphinx::create",
"file": "storage/sphinx/ha_sphinx.cc"
},
"source": "https://github.com/mariadb/server/commit/50c426200224a4527e84052aa2ab32be893f43f4",
"digest": {
"function_hash": "212715881248758194619613885069756850581",
"length": 3204.0
},
"signature_type": "Function",
"id": "CVE-2018-3058-c7d63e12"
},
{
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "storage/sphinx/ha_sphinx.cc"
},
"source": "https://github.com/mariadb/server/commit/50c426200224a4527e84052aa2ab32be893f43f4",
"digest": {
"threshold": 0.9,
"line_hashes": [
"249570897828672210811035826591486207304",
"322223126166962698284273532715400319885",
"270290635075884075638435410358092034776",
"297141217069259403319068516826314832701"
]
},
"signature_type": "Line",
"id": "CVE-2018-3058-fd9a5a54"
}
]
"2026-05-18T17:44:17Z"
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "5.5.0"
},
{
"last_affected": "5.5.60"
},
{
"introduced": "5.6.0"
},
{
"last_affected": "5.6.40"
},
{
"introduced": "5.7.0"
},
{
"last_affected": "5.7.22"
}
]
}