{"id":"CVE-2017-3641","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","modified":"2026-04-16T01:42:43.868685160Z","published":"2017-08-08T15:29:08.337Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2017:2290-1","SUSE-SU-2017:2921-1","SUSE-SU-2018:0079-1","SUSE-SU-2018:1853-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1038928"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3922"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3944"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/99767"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1038928"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2439"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2729"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3955"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"34cd74e52185de2ea3156e8295de3c638cde8c88"},{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"0a479f786020d3c1431a25523661759748404770"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"c548fb0667ffe71d9387eaec342b1716fc4c9526"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"535910ae5f20e36405631030e9c0eb22fe40a7c4"}]}],"versions":["mariadb-10.2.0","mysql-5.5.49","mysql-5.5.50","mysql-5.5.51","mysql-5.5.52","mysql-5.5.53","mysql-5.5.54","mysql-5.5.55","mysql-5.5.56"],"database_specific":{"vanir_signatures":[{"deprecated":false,"source":"https://github.com/mariadb/server/commit/c548fb0667ffe71d9387eaec342b1716fc4c9526","signature_version":"v1","digest":{"length":1304,"function_hash":"248046718813765606309068251123658866222"},"signature_type":"Function","id":"CVE-2017-3641-2311d166","target":{"file":"sql/sql_derived.cc","function":"mysql_derived_merge_for_insert"}},{"deprecated":false,"source":"https://github.com/mariadb/server/commit/c548fb0667ffe71d9387eaec342b1716fc4c9526","signature_version":"v1","digest":{"line_hashes":["37598745779533050802933831451354240563","148100691799475688462979637583791371574","256714664058405617444146650046350315869","30840251350323357694068166601770960776","122022733530817239314150393063036047891","318300470379782107237051717217085670592","96276598501522749142741981776648661971","74754980952004710391973414329717813170","216173259946383661325751397329790466678"],"threshold":0.9},"signature_type":"Line","id":"CVE-2017-3641-8ba756c4","target":{"file":"sql/sql_derived.cc"}}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3641.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"fixed":"34cd74e52185de2ea3156e8295de3c638cde8c88"}]}],"versions":["mysql-5.0.87sp1","mysql-5.0.90","mysql-5.0.91","mysql-5.0.92","mysql-5.0.93","mysql-5.0.94","mysql-5.0.95","mysql-5.0.96","mysql-5.1.40sp1","mysql-5.1.41","mysql-5.1.42","mysql-5.1.43","mysql-5.1.43sp1","mysql-5.1.44","mysql-5.1.45","mysql-5.1.46","mysql-5.1.46sp1","mysql-5.1.47","mysql-5.1.48","mysql-5.1.49","mysql-5.1.49sp1","mysql-5.1.50","mysql-5.1.51","mysql-5.1.52","mysql-5.1.52sp1","mysql-5.1.53","mysql-5.1.54","mysql-5.1.55","mysql-5.1.56","mysql-5.1.57","mysql-5.1.58","mysql-5.1.59","mysql-5.1.60","mysql-5.1.61","mysql-5.1.62","mysql-5.1.63","mysql-5.1.65","mysql-5.1.66","mysql-5.1.67","mysql-5.1.68","mysql-5.1.69","mysql-5.1.69-retag","mysql-5.1.70","mysql-5.1.71","mysql-5.1.72","mysql-5.1.73","mysql-5.1.74","mysql-5.1.75","mysql-5.1.76","mysql-5.1.77","mysql-5.5.0","mysql-5.5.1-m2","mysql-5.5.10","mysql-5.5.11","mysql-5.5.12","mysql-5.5.13","mysql-5.5.14","mysql-5.5.15","mysql-5.5.16","mysql-5.5.17","mysql-5.5.18","mysql-5.5.19","mysql-5.5.2-m2","mysql-5.5.20","mysql-5.5.21","mysql-5.5.22","mysql-5.5.23","mysql-5.5.24","mysql-5.5.25","mysql-5.5.25a","mysql-5.5.27","mysql-5.5.28","mysql-5.5.29","mysql-5.5.3-m3","mysql-5.5.30","mysql-5.5.31","mysql-5.5.32","mysql-5.5.33","mysql-5.5.34","mysql-5.5.35","mysql-5.5.36","mysql-5.5.37","mysql-5.5.38","mysql-5.5.39","mysql-5.5.40","mysql-5.5.41","mysql-5.5.42","mysql-5.5.43","mysql-5.5.44","mysql-5.5.45","mysql-5.5.46","mysql-5.5.47","mysql-5.5.48","mysql-5.5.49","mysql-5.5.5-m3","mysql-5.5.50","mysql-5.5.51","mysql-5.5.52","mysql-5.5.53","mysql-5.5.54","mysql-5.5.55","mysql-5.5.56","mysql-5.5.6-rc","mysql-5.5.7","mysql-5.5.8","mysql-5.5.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3641.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}