{"id":"CVE-2018-2784","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).","modified":"2026-05-18T05:51:40.832606035Z","published":"2018-04-19T02:29:03.067Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2018:1382-1","SUSE-SU-2018:1771-1","SUSE-SU-2018:1781-1","SUSE-SU-2018:1781-2","SUSE-SU-2018:1853-1"],"database_specific":{"unresolved_ranges":[{"vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"17.10"},{"last_affected":"18.04"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"]},{"vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]},{"vendor_product":"netapp:active_iq_unified_manager","extracted_events":[{"introduced":"7.3"},{"introduced":"9.5"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"]}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103801"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040698"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1254"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3655"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1258"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201908-24"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180419-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3629-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3629-3/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4341"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"2e5681a450627709512138a7d15b8ee035a29c6a"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"1025363a35571d5a0ba7023287104d23c7aa61d5"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"bb045e7931c451b228ffc5bcdb1791a31eb0c852"}],"database_specific":{"cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"10.0.0"},{"fixed":"10.0.35"},{"introduced":"10.1.0"},{"fixed":"10.1.33"},{"introduced":"10.2.0"},{"fixed":"10.2.15"}],"source":"CPE_FIELD"}}],"versions":["mariadb-10.2.13","mariadb-10.2.14","mariadb-10.1.32","mariadb-10.1.31","mariadb-10.2.12","mariadb-10.1.30","mariadb-10.2.11","mariadb-10.1.29","mariadb-10.2.10","mariadb-10.1.28","mariadb-10.1.27","mariadb-10.1.26","mariadb-10.1.25","mariadb-10.1.24","mariadb-10.1.23","mariadb-10.2.5","mariadb-10.1.22","mariadb-10.1.21","mariadb-10.1.20","mariadb-10.1.19","mariadb-10.1.18","mariadb-10.2.2","mariadb-10.1.17","mariadb-10.1.16","mariadb-10.2.1","mariadb-10.1.15","mariadb-10.1.14","mariadb-10.2.0","mariadb-10.1.13","mariadb-10.1.12","mariadb-10.1.11","mariadb-10.1.10","mariadb-10.1.9","mariadb-10.1.8","mariadb-10.1.7","mariadb-10.1.6","mariadb-10.1.5","mariadb-10.1.4","mariadb-10.1.3","mariadb-10.1.2","mariadb-10.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-2784.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"efb4087cfe12134e1541b39ee9a4305f7cd225f5"},{"last_affected":"f5ed5d58ffae0ff4c668830376faa411987915a1"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"5.6.0"},{"last_affected":"5.6.39"},{"introduced":"5.7.0"},{"last_affected":"5.7.21"}],"cpe":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"}}],"versions":["mysql-5.6.39","mysql-5.7.21","mysql-5.1.4","mysql-4.0.4","mysql-4.0.2","mysql-3.23.36","mysql-3.23.33","mysql-3.23.32","mysql-3.23.31","mysql-3.23.30-gamma","mysql-3.23.28-gamma","mysql-3.23.22-beta"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-2784.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}