Vulnerability Details : CVE-2014-0001
Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.
Vulnerability category: OverflowExecute codeDenial of service
Threat overview for CVE-2014-0001
Top countries where our scanners detected CVE-2014-0001
Top open port discovered on systems with this issue
53
IPs affected by CVE-2014-0001 21,913
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-0001!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-0001
Probability of exploitation activity in the next 30 days: 95.23%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-0001
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-0001
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0001
-
http://rhn.redhat.com/errata/RHSA-2014-0189.html
RHSA-2014:0189 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/65298
Oracle MySQL Client 'main()' Function Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
http://www.mandriva.com/security/advisories?name=MDVSA-2014:029
mandriva.comBroken Link
-
https://mariadb.com/kb/en/mariadb-5535-changelog/
MariaDB 5.5.35 Changelog - MariaDB Knowledge BasePatch;Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0164.html
RHSA-2014:0164 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securitytracker.com/id/1029708
MySQL Buffer Overflow May Let Remote Servers Execute Arbitrary Code on the Target Client - SecurityTracker
-
http://security.gentoo.org/glsa/glsa-201409-04.xml
MySQL: Multiple vulnerabilities (GLSA 201409-04) — Gentoo securityPatch;Third Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/90901
MySQL main() buffer overflow CVE-2014-0001 Vulnerability Report
-
https://bugzilla.redhat.com/show_bug.cgi?id=1054592
1054592 – (CVE-2014-0001) CVE-2014-0001 mysql: command-line tool buffer overflow via long server version stringPatch;Issue Tracking;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0173.html
RHSA-2014:0173 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0186.html
RHSA-2014:0186 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://secunia.com/advisories/52161
Sign in
-
http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64
~maria-captains/maria/5.5 : revision 2502.565.64Not Applicable
Products affected by CVE-2014-0001
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.29:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.30:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.31:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.32:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.33:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.35:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.36:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.5.34:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:5.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*