{"id":"CVE-2018-2781","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","modified":"2026-05-15T12:03:12.316339212Z","published":"2018-04-19T02:29:02.880Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2018:1333-1","SUSE-SU-2018:1382-1","SUSE-SU-2018:1771-1","SUSE-SU-2018:1781-1","SUSE-SU-2018:1781-2","SUSE-SU-2018:1853-1","openSUSE-SU-2024:11038-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"],"vendor_product":"canonical:ubuntu_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"17.10"},{"last_affected":"18.04"}]},{"cpes":["cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0"},{"last_affected":"8.0"},{"last_affected":"9.0"}],"source":"CPE_FIELD","vendor_product":"debian:debian_linux"},{"cpes":["cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"],"extracted_events":[{"introduced":"7.3"},{"introduced":"9.5"}],"source":"CPE_FIELD","vendor_product":"netapp:active_iq_unified_manager"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_desktop","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_eus","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.5"},{"last_affected":"7.6"},{"last_affected":"7.7"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server_aus","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"},{"last_affected":"7.7"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server_tus","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"},{"last_affected":"7.7"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_workstation","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpes":["cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"12"}],"source":"CPE_FIELD","vendor_product":"redhat:openstack"}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103825"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040698"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1254"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2439"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2729"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3655"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1258"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201908-24"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180419-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3629-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3629-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3629-3/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4176"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4341"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}