Vulnerability Details : CVE-2016-0600
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
Products affected by CVE-2016-0600
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
Threat overview for CVE-2016-0600
Top countries where our scanners detected CVE-2016-0600
Top open port discovered on systems with this issue
53
IPs affected by CVE-2016-0600 137,509
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-0600!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-0600
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-0600
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:N/A:P |
6.8
|
2.9
|
NIST |
References for CVE-2016-0600
-
http://rhn.redhat.com/errata/RHSA-2016-1481.html
RHSA-2016:1481 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Oracle Critical Patch Update - January 2016Vendor Advisory
-
http://www.ubuntu.com/usn/USN-2881-1
USN-2881-1: MySQL vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
[security-announce] openSUSE-SU-2016:0377-1: important: Security updateMailing List;Third Party Advisory
-
https://mariadb.com/kb/en/mdb-10023-rn/
MariaDB 10.0.23 Release Notes - MariaDB Knowledge BaseVendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
[security-announce] openSUSE-SU-2016:1664-1: important: Security updateMailing List;Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3459
Debian -- Security Information -- DSA-3459-1 mysql-5.5Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
[security-announce] SUSE-SU-2016:1620-1: important: Security update forMailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1034708
MySQL Multiple Bugs Let Remote Users Access Data and Deny Service, Remote Authenticated Users Modify Data, and Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Oracle Solaris Bulletin - April 2016Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-0534.html
RHSA-2016:0534 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
[security-announce] SUSE-SU-2016:1619-1: important: Security update forMailing List;Third Party Advisory
-
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
MariaDB 10.1.10 Release Notes - MariaDB Knowledge BaseVendor Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Oracle Linux Bulletin - April 2016Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
[security-announce] openSUSE-SU-2016:0367-1: important: Security updateThird Party Advisory
-
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
MariaDB 5.5.47 Release Notes - MariaDB Knowledge BaseVendor Advisory
-
https://access.redhat.com/errata/RHSA-2016:1132
RHSA-2016:1132 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-0705.html
RHSA-2016:0705 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/81188
Oracle MySQL CVE-2016-0600 Remote Security VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
[security-announce] openSUSE-SU-2016:1686-1: important: Security updateThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-1480.html
RHSA-2016:1480 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.debian.org/security/2016/dsa-3453
Debian -- Security Information -- DSA-3453-1 mariadb-10.0Patch;Third Party Advisory
Jump to