Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "16.04"
},
{
"last_affected": "18.04"
},
{
"last_affected": "18.10"
}
],
"source": "CPE_FIELD",
"vendor_product": "canonical:ubuntu_linux"
},
{
"cpes": [
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
],
"extracted_events": [
{
"introduced": "7.3"
},
{
"introduced": "9.5"
}
],
"source": "CPE_FIELD",
"vendor_product": "netapp:active_iq_unified_manager"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:8.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
},
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_desktop"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.1"
},
{
"last_affected": "8.2"
},
{
"last_affected": "8.4"
},
{
"last_affected": "8.6"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_eus"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
},
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.2"
},
{
"last_affected": "8.4"
},
{
"last_affected": "8.6"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server_aus"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.2"
},
{
"last_affected": "8.4"
},
{
"last_affected": "8.6"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server_tus"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:8.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
},
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_workstation"
}
]
}{
"extracted_events": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.5.62"
},
{
"introduced": "10.0.0"
},
{
"fixed": "10.0.37"
},
{
"introduced": "10.1.0"
},
{
"fixed": "10.1.36"
},
{
"introduced": "10.2.0"
},
{
"fixed": "10.2.18"
},
{
"introduced": "10.3.0"
},
{
"fixed": "10.3.10"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
}"2026-05-18T15:12:06Z"
[
{
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2019-2503-31d9682c",
"signature_version": "v1",
"digest": {
"line_hashes": [
"160075039351122944864225182554874669088",
"79298247766313756764199076124200846221",
"45115464249083926102003093201691213873",
"234850493844753889546639429561578022423",
"28144202877714812540506170033579428584",
"64207172708277179404454160631042475789",
"237722189373658064007831416036979490253",
"40893712863390563503154152743217547031",
"117668516850458519561463813363427354257",
"157614703768094946194775545036620441701",
"15967427616295603339113842507058398295",
"104723310754908331401965919169681994802",
"128841576046909535802914848653453387150",
"284907253619130800196406482515430948114",
"58255352786302269574555313408484604557",
"157514477970302582442983000214658193991",
"49411501730675364796830781016823824091",
"156754744226265852277547691043485091575",
"151934133497638100292742275943448330976",
"10181848583206569474669288713374153883",
"247129231873868569546561042046461048482"
],
"threshold": 0.9
},
"source": "https://github.com/mariadb/server/commit/bac287c315b1792e7ae33f91add6a60292f9bae8",
"target": {
"file": "mysys/mf_iocache2.c"
}
},
{
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2019-2503-72121355",
"signature_version": "v1",
"digest": {
"function_hash": "308253576018065477432791791193588044020",
"length": 1331.0
},
"source": "https://github.com/mariadb/server/commit/bad2f1569da57c4a81cc84ec2f4a79924df9c8d6",
"target": {
"file": "sql/sql_truncate.cc",
"function": "Sql_cmd_truncate_table::truncate_table"
}
},
{
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2019-2503-ed6762dc",
"signature_version": "v1",
"digest": {
"line_hashes": [
"233329946525851308164343744210653883501",
"204742638511364347075405366020716870838",
"164974133903162645092052012131298403240"
],
"threshold": 0.9
},
"source": "https://github.com/mariadb/server/commit/bad2f1569da57c4a81cc84ec2f4a79924df9c8d6",
"target": {
"file": "sql/sql_truncate.cc"
}
},
{
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2019-2503-f33e8bff",
"signature_version": "v1",
"digest": {
"line_hashes": [
"284485189603290621779676875043266591403",
"132605580046284372650070224531900132128",
"302718530449704346344600505888277165066",
"55767056226081983856624214715648615778"
],
"threshold": 0.9
},
"source": "https://github.com/mariadb/server/commit/bad2f1569da57c4a81cc84ec2f4a79924df9c8d6",
"target": {
"file": "sql/sql_class.h"
}
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-2503.json"
{
"extracted_events": [
{
"introduced": "5.6.0"
},
{
"last_affected": "5.6.42"
},
{
"introduced": "5.7.0"
},
{
"last_affected": "5.7.24"
},
{
"introduced": "8.0.0"
},
{
"last_affected": "8.0.13"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
}