{"id":"CVE-2017-3243","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).","modified":"2026-05-18T11:10:06.360338Z","published":"2017-01-27T22:59:02.427Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2017:0408-1","SUSE-SU-2017:0411-1","SUSE-SU-2017:0412-1","openSUSE-SU-2024:11038-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"8.0"}]},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_desktop","extracted_events":[{"last_affected":"7.0"}]},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_eus","extracted_events":[{"last_affected":"7.4"},{"last_affected":"7.5"},{"last_affected":"7.6"},{"last_affected":"7.7"}]},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server","extracted_events":[{"last_affected":"7.0"}]},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server_aus","extracted_events":[{"last_affected":"7.6"},{"last_affected":"7.7"}]},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server_tus","extracted_events":[{"last_affected":"7.6"},{"last_affected":"7.7"}]},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_workstation","extracted_events":[{"last_affected":"7.0"}]}]},"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3767"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3770"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95538"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037640"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-17"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-18"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"c8f0eeb9c8596be83fefb7fef9f9871e53edb020"},{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"5fc1ba604e27b7d9eaa2977ef5b0c180f6f62565"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"f7d030489d2980c9deb733925515099ec256f6d2"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"5.5.0"},{"fixed":"5.5.54"},{"introduced":"10.0.0"},{"fixed":"10.0.29"},{"introduced":"10.1.0"},{"fixed":"10.1.21"}]}}],"versions":["mariadb-10.1.20","mariadb-10.1.19","mariadb-10.1.18","mariadb-10.1.17","mariadb-10.1.16","mariadb-10.1.15","mariadb-10.1.14","mariadb-10.1.13","mariadb-10.1.12","mariadb-10.1.11","mariadb-10.1.10","mariadb-10.1.9","mariadb-10.1.8","mariadb-10.1.7","mariadb-10.1.6","mariadb-10.1.5","mariadb-10.1.4","mariadb-10.1.3","mariadb-10.1.2","mariadb-10.1.0"],"database_specific":{"vanir_signatures_modified":"2026-05-18T11:10:06Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3243.json","vanir_signatures":[{"digest":{"length":1075,"function_hash":"326577626690167958606778565745841641029"},"deprecated":false,"target":{"function":"wsrep_calc_row_hash","file":"storage/xtradb/handler/ha_innodb.cc"},"source":"https://github.com/mariadb/server/commit/5fc1ba604e27b7d9eaa2977ef5b0c180f6f62565","signature_type":"Function","signature_version":"v1","id":"CVE-2017-3243-2235861b"},{"digest":{"length":4678,"function_hash":"175766638502419520218478376205151830061"},"deprecated":false,"target":{"function":"wsrep_store_key_val_for_row","file":"storage/xtradb/handler/ha_innodb.cc"},"source":"https://github.com/mariadb/server/commit/5fc1ba604e27b7d9eaa2977ef5b0c180f6f62565","signature_type":"Function","signature_version":"v1","id":"CVE-2017-3243-76d7bb16"},{"digest":{"line_hashes":["333910009814716899599761924093289489726","161392224999518567510718607174078569010","161097539754424727880941917296259394470","86950865214847603434991963376525204394","149603238303571009756227611135528613560","246754121958178494555659751381354980297","112180117738318881565344278433296106535","56934855970519006216491266214889014278","177233899003535037117533813868483428969","91781135331166554714959393998795539181","231826346572631787101747650932251996807","120129231197026531763378830534168927209","78750874032296690609296176761798461946","37466225183381131843040316628502534513","73966958620296014639090697993023755838","302517151867660583156292446738041253690","320251111942484271165771358375346713457","137617643939518963627606737565894291194"],"threshold":0.9},"deprecated":false,"target":{"file":"storage/xtradb/handler/ha_innodb.cc"},"source":"https://github.com/mariadb/server/commit/5fc1ba604e27b7d9eaa2977ef5b0c180f6f62565","signature_type":"Line","signature_version":"v1","id":"CVE-2017-3243-d7841ca0"}]}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"last_affected":"5c6169fb309981b564a17bee31b367a18866d674"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"5.5.0"},{"last_affected":"5.5.53"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3243.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}