Vulnerability Details : CVE-2017-3653
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
Products affected by CVE-2017-3653
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
- cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
Threat overview for CVE-2017-3653
Top countries where our scanners detected CVE-2017-3653
Top open port discovered on systems with this issue
3306
IPs affected by CVE-2017-3653 473,395
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-3653!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-3653
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-3653
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST | |
3.1
|
LOW | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N |
1.6
|
1.4
|
NIST |
References for CVE-2017-3653
-
https://access.redhat.com/errata/RHSA-2017:2886
RHSA-2017:2886 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
-
http://www.securitytracker.com/id/1038928
MySQL Multiple Flaws Let Remote Users Access Data, Remote and Local Users Deny Service, and Local Users Access and Modify Data - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2017:2787
RHSA-2017:2787 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2729
RHSA-2018:2729 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2439
RHSA-2018:2439 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
-
http://www.securityfocus.com/bid/99810
Oracle MySQL Server CVE-2017-3653 Remote Security VulnerabilityThird Party Advisory;VDB Entry
-
http://www.debian.org/security/2017/dsa-3922
Debian -- Security Information -- DSA-3922-1 mysql-5.5Third Party Advisory
-
https://www.debian.org/security/2017/dsa-3955
Debian -- Security Information -- DSA-3955-1 mariadb-10.1Third Party Advisory
-
http://www.debian.org/security/2017/dsa-3944
Debian -- Security Information -- DSA-3944-1 mariadb-10.0Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:0279
RHSA-2018:0279 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Oracle Critical Patch Update - July 2017Patch;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0574
RHSA-2018:0574 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
Jump to