Vulnerability Details : CVE-2013-5908
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.
Products affected by CVE-2013-5908
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
Threat overview for CVE-2013-5908
Top countries where our scanners detected CVE-2013-5908
Top open port discovered on systems with this issue
3306
IPs affected by CVE-2013-5908 58,899
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2013-5908!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2013-5908
0.98%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-5908
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:N/A:P |
4.9
|
2.9
|
NIST |
References for CVE-2013-5908
-
http://rhn.redhat.com/errata/RHSA-2014-0189.html
RHSA-2014:0189 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/64896
Oracle MySQL Server CVE-2013-5908 Remote Security VulnerabilityThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2014-0164.html
RHSA-2014:0164 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
Juniper Networks - 2015-10 Security Bulletin: Junos Space: Multiple Vulnerabilities in Junos SpaceThird Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/90389
Oracle MySQL Server Error Handling denial of service CVE-2013-5908 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
Oracle Critical Patch Update - January 2014Vendor Advisory
-
http://security.gentoo.org/glsa/glsa-201409-04.xml
MySQL: Multiple vulnerabilities (GLSA 201409-04) — Gentoo securityThird Party Advisory
-
http://www.securityfocus.com/bid/64758
RETIRED: Oracle January 2014 Critical Patch Update Multiple VulnerabilitiesThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2014-0173.html
RHSA-2014:0173 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0186.html
RHSA-2014:0186 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://ubuntu.com/usn/usn-2086-1
USN-2086-1: MySQL vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.debian.org/security/2014/dsa-2845
Debian -- Security Information -- DSA-2845-1 mysql-5.1Third Party Advisory
-
http://www.debian.org/security/2014/dsa-2848
Debian -- Security Information -- DSA-2848-1 mysql-5.5Third Party Advisory
Jump to