Vulnerability Details : CVE-2012-5614
Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.
Vulnerability category: Denial of service
Products affected by CVE-2012-5614
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
Threat overview for CVE-2012-5614
Top countries where our scanners detected CVE-2012-5614
Top open port discovered on systems with this issue
22
IPs affected by CVE-2012-5614 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-5614!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-5614
1.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5614
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST |
References for CVE-2012-5614
-
http://www.openwall.com/lists/oss-security/2012/12/02/3
oss-security - Re: Re: [Full-disclosure] MySQL (Linux) Stack based buffer overrun PoC ZerodayMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2012/12/02/4
oss-security - Re: Re: [Full-disclosure] MySQL (Linux) Stack based buffer overrun PoC ZerodayMailing List;Third Party Advisory
-
https://mariadb.atlassian.net/browse/MDEV-3910
[MDEV-3910] COM_BINLOG_DUMP crash on invalid data - JIRABroken Link;Patch
-
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
Oracle Critical Patch Update - April 2013Vendor Advisory
-
http://seclists.org/fulldisclosure/2012/Dec/7
Full Disclosure: MySQL Denial of Service Zeroday PoCExploit;Mailing List;Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
mandriva.comBroken Link
-
http://rhn.redhat.com/errata/RHSA-2013-0772.html
RHSA-2013:0772 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securitytracker.com/id?1027829
MySQL Bug in UpdateXML() Lets Remote Authenticated Users Deny Service - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
http://security.gentoo.org/glsa/glsa-201308-06.xml
MySQL: Multiple vulnerabilities (GLSA 201308-06) — Gentoo securityThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=882607
882607 – (CVE-2012-5614) CVE-2012-5614 mysql: COM_BINLOG_DUMP crash on invalid dataIssue Tracking
Jump to