CVE-2014-4238
Published Jul 17, 2014
Last updated 6 years ago
Overview
- Description
- Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
- Source
- secalert_us@oracle.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D91CF491-A8C9-4C3C-A0CC-33980DF395F0", "versionEndIncluding": "5.6.17" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0089EDF-4806-417D-A4F1-63FF03C5AEF3" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "898A5CD5-83A5-4335-835F-759F82862753" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C851FA0E-357E-4B9E-A441-9C74B3526B37" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B12FA18C-AB93-4522-AA2C-303342452E59" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FD31981-E3ED-41D0-92EB-ABA7490D60E5" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E918FF1-8B40-4DC3-9269-1D3BFD18C58D" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BCD7C2D-49E9-4D78-90CF-F747A1584269" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7956E471-E98A-4527-A5F4-863210E09D5A" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "615F499A-5C33-4E79-80FA-9A1453D8A3D4" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AD40EA2-F432-4F89-9E59-0DB4D415CA85" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41494A2D-4BBC-4C3B-841F-878C2430A444" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A62DA4D8-27B4-4026-9035-75AC35F58439" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6DF5346-DC9A-4615-BEAC-2F5FD57C3B6B" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E948C884-E747-4E7C-B111-4A8DA22E421C" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F933CF3-A850-4D3F-A16D-8129E246BF55" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "038D17E1-2932-4D47-A748-F8A1D46B6721" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9028492-4114-4C9A-9E88-4B6C4FA6CC2C" } ], "operator": "OR" } ] } ]