{"id":"CVE-2018-2761","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).","modified":"2026-05-18T17:44:13.228545Z","published":"2018-04-19T02:29:01.707Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2018:1333-1","SUSE-SU-2018:1382-1","SUSE-SU-2018:1771-1","SUSE-SU-2018:1781-1","SUSE-SU-2018:1781-2","SUSE-SU-2018:1853-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"17.10"},{"last_affected":"18.04"}],"cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"],"vendor_product":"canonical:ubuntu_linux"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"},{"last_affected":"8.0"},{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux"},{"source":"CPE_FIELD","extracted_events":[{"introduced":"7.3"},{"introduced":"9.5"}],"cpes":["cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"],"vendor_product":"netapp:active_iq_unified_manager"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_desktop"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.5"},{"last_affected":"7.6"},{"last_affected":"7.7"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_eus"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"},{"last_affected":"7.7"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server_aus"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"},{"last_affected":"7.7"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server_tus"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_workstation"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"12"}],"cpes":["cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*"],"vendor_product":"redhat:openstack"}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103820"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040698"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1254"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2439"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2729"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3655"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1258"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201908-24"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180419-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3629-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3629-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3629-3/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4176"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4341"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"c0b4d74b52e7eec9b13af732193f7f8d7abe05de"},{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"2e5681a450627709512138a7d15b8ee035a29c6a"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"1025363a35571d5a0ba7023287104d23c7aa61d5"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"bb045e7931c451b228ffc5bcdb1791a31eb0c852"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"5.5.0"},{"fixed":"5.5.60"},{"introduced":"10.0.0"},{"fixed":"10.0.35"},{"introduced":"10.1.0"},{"fixed":"10.1.33"},{"introduced":"10.2.0"},{"fixed":"10.2.15"}],"cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"}}],"versions":["mariadb-10.2.13","mariadb-10.2.14","mariadb-10.1.32","mariadb-10.1.31","mariadb-10.2.12","mariadb-10.1.30","mariadb-10.2.11","mariadb-10.1.29","mariadb-10.2.10","mariadb-10.1.28","mariadb-10.1.27","mariadb-10.1.26","mariadb-10.1.25","mariadb-10.1.24","mariadb-10.1.23","mariadb-10.2.5","mariadb-10.1.22","mariadb-10.1.21","mariadb-10.1.20","mariadb-10.1.19","mariadb-10.1.18","mariadb-10.2.2","mariadb-10.1.17","mariadb-10.1.16","mariadb-10.2.1","mariadb-10.1.15","mariadb-10.1.14","mariadb-10.2.0","mariadb-10.1.13","mariadb-10.1.12","mariadb-10.1.11","mariadb-10.1.10","mariadb-10.1.9","mariadb-10.1.8","mariadb-10.1.7","mariadb-10.1.6","mariadb-10.1.5","mariadb-10.1.4","mariadb-10.1.3","mariadb-10.1.2","mariadb-10.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-2761.json","vanir_signatures":[{"target":{"function":"alter_close_tables","file":"sql/sql_partition.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-001e3e3f","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"231123461649866527768674208945148404874","length":343}},{"target":{"file":"sql/sql_table.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-20248fe9","signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["98623316213409793617979516151021505920","150315841134420593989189694594199170377","74220954711237228064095972947703663116","154305823820827940419984535907620929865","289479147918564409745345395754297148013","308070364756342782418773016799218524736","161552418692699585795449739961602993853","85487136929008508869923944773295623492","275388682514445710893178814805171875110","178809449813359038226666686323941628709","119949744805440180132144973758597620903","185511711288508735090102321271938712463","123105818852375417367735793496370373956","39420389331847669276740398348823056549","287683927221303284220379719752010569258","151172545567567784782157395451800999432","250515250401651252803798436142034922095","140575188252870095998821594577623132738","110147739517200557046208775879364660604","199070321020541592119258315719848103148"]}},{"target":{"file":"sql/sql_truncate.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-3598bd1a","signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["248268375571264674713868657641409635309","6756541203236256621229262233475091335","288477169696598487647479116107449431283","38338874926378347984271477663154559707","156349013963660213813034118648638470744"]}},{"target":{"file":"sql/sql_trigger.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-42c280ea","signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["229668877858838427304667685812534150080","71733128727302034242409639618612353324","37303647763763701285109014035231688514","240746509587050914626403293229669116841","49187661201700155029618977023580532144"]}},{"target":{"file":"sql/sql_admin.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-499b0792","signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["17803114805012787919203676656937789911","157325619074821773502102572840272271369","221252887105973422343886302901183412828","228081691773921474700907818304973924665","91687825008507014556510061127450564608"]}},{"target":{"function":"Truncate_statement::lock_table","file":"sql/sql_truncate.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-59b80242","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"165487064594079959249880768453359126541","length":1199}},{"target":{"file":"sql/sql_partition.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-62296843","signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["733665378926861439603144577900355062","180153685388187958939941610026288092376","177249787923084198955959010311328384722","331186826889024573165155955077766627707","158274671428071215887037664373851655352","18922941291621657244684992560598003226","91644651387436945530500251138718183135","35460528332965259364523146539808523513","140927666597852594906838227922529625202"]}},{"target":{"file":"sql/sql_base.h"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-91fd7150","signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["300406142040319082123527811638963238003","199040959749600054709747629370655091601","210529970254800422777482044429507215811","144932245513799295406022564055704306037","152800187986008570736973837847258222597"]}},{"target":{"function":"alter_partition_lock_handling","file":"sql/sql_partition.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-93a757d6","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"212848505831477462977019393544916051051","length":414}},{"target":{"function":"close_all_tables_for_name","file":"sql/sql_base.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-9f23597f","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"254666496295307123912805047719032398588","length":848}},{"target":{"function":"close_cached_tables","file":"sql/sql_base.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-a13dc76b","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"307547925058980154024824836833721480709","length":2516}},{"target":{"function":"mysql_create_or_drop_trigger","file":"sql/sql_trigger.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-ab1f86a2","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"228120291487408690622172994366016631962","length":3133}},{"target":{"function":"prepare_for_repair","file":"sql/sql_admin.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-d7a5c234","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"42645391966692858134861268056434167785","length":3163}},{"target":{"function":"mysql_rm_table_no_locks","file":"sql/sql_table.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-d85f9310","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"181946487599166129287471157698235931442","length":6584}},{"target":{"file":"sql/sql_base.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-f89e984c","signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["19159825664530579448457382607599790985","219641044277283784788035118736380523644","58718184368927826411468608788623464271","16531678164178269163773668188517326459","306008785078093896767990199558236913553","154321874791254813302235133160438739629","47410171087885668586724438919720239358","149576705647977492009294619323259281896","120752287782577720187839525419105292409","122648421302786558836472958225028865329","74684100635662149771157483139565709120","331500074359127820532341549682819740334","145533971336799931076766909971236426736","25993982317811094185796442155468024435","241257698469144830092333010133194498943","139296395445375594353912733722447648149","338045279117053075942898738633579988776","113930363466154712277001444097963236746","178735082132599490753945704487387552470","139590559789982818246547745039844995009","216384293083677055841794255037151567255","189504152669391006592752965488127884946","60227878159953189981448899199680952782","189466702747004673588972952417441532325","1299079623696277756489701288817884925"]}},{"target":{"function":"mysql_alter_table","file":"sql/sql_table.cc"},"source":"https://github.com/mariadb/server/commit/c0b4d74b52e7eec9b13af732193f7f8d7abe05de","deprecated":false,"id":"CVE-2018-2761-fce8cd3f","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"226020517142138691716213710526843560222","length":22039}}],"vanir_signatures_modified":"2026-05-18T17:44:13Z"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"last_affected":"946d9e4db4896992400cabbd0d1db9a0a10cbfd1"},{"introduced":"0"},{"last_affected":"efb4087cfe12134e1541b39ee9a4305f7cd225f5"},{"last_affected":"f5ed5d58ffae0ff4c668830376faa411987915a1"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"5.5.0"},{"last_affected":"5.5.59"},{"introduced":"5.6.0"},{"last_affected":"5.6.39"},{"introduced":"5.7.0"},{"last_affected":"5.7.21"}],"cpe":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"}}],"versions":["mysql-5.6.39","mysql-5.7.21","mysql-5.5.59","mysql-5.5.49","mysql-5.5.47","mysql-5.5.44","mysql-5.5.27","mysql-5.5.25","mysql-5.5.23","mysql-5.5.19","mysql-5.5.15","mysql-5.1.4","mysql-4.0.4","mysql-4.0.2","mysql-3.23.36","mysql-3.23.33","mysql-3.23.32","mysql-3.23.31","mysql-3.23.30-gamma","mysql-3.23.28-gamma","mysql-3.23.22-beta"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-2761.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}