{"id":"CVE-2018-3058","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).","modified":"2026-05-18T17:44:17.995901Z","published":"2018-07-18T13:29:07.647Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2018:2411-1","SUSE-SU-2018:3972-1","SUSE-SU-2018:4211-1","SUSE-SU-2019:0555-1","SUSE-SU-2019:0628-1","SUSE-SU-2019:1441-1","SUSE-SU-2019:2048-1","openSUSE-SU-2019:0327-1","openSUSE-SU-2024:11038-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"}],"cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"],"vendor_product":"canonical:ubuntu_linux"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_desktop"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_workstation"}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/104766"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041294"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3655"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1258"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2327"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180726-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3725-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3725-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4341"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"e48d775c6f066add457fa8cfb2ebc4d5ff0c7613"},{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"5d90717cc9e05f2a3bfe137031eb15fc1e291ad7"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"50c426200224a4527e84052aa2ab32be893f43f4"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"5553d3f1f691a374124686946bd1f1cc4ef9fb45"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"ca26f91bcaa21933147974c823852a2e1c2e2bd7"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"5.5.0"},{"fixed":"5.5.61"},{"introduced":"10.0.0"},{"fixed":"10.0.36"},{"introduced":"10.1.0"},{"fixed":"10.1.35"},{"introduced":"10.2.0"},{"fixed":"10.2.17"},{"introduced":"10.3.0"},{"fixed":"10.3.9"}],"cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"}}],"versions":["mariadb-10.2.13","mariadb-10.2.16","mariadb-10.1.34","mariadb-10.3.7","mariadb-10.2.15","mariadb-10.1.33","mariadb-10.3.6","mariadb-10.2.14","mariadb-10.1.32","mariadb-10.3.5","mariadb-10.1.31","mariadb-10.3.4","mariadb-10.2.12","mariadb-10.1.30","mariadb-10.2.11","mariadb-10.1.29","mariadb-10.2.10","mariadb-10.3.2","mariadb-10.1.28","mariadb-10.1.27","mariadb-10.3.1","mariadb-10.1.26","mariadb-10.1.25","mariadb-10.1.24","mariadb-10.1.23","mariadb-10.2.5","mariadb-10.3.0","mariadb-10.1.22","mariadb-10.1.21","mariadb-10.1.20","mariadb-10.1.19","mariadb-10.1.18","mariadb-10.2.2","mariadb-10.1.17","mariadb-10.1.16","mariadb-10.2.1","mariadb-10.1.15","mariadb-10.1.14","mariadb-10.2.0","mariadb-10.1.13","mariadb-10.1.12","mariadb-10.1.11","mariadb-10.1.10","mariadb-10.1.9","mariadb-10.1.8","mariadb-10.1.7","mariadb-10.1.6","mariadb-10.1.5","mariadb-10.1.4","mariadb-10.1.3","mariadb-10.1.2","mariadb-10.1.0"],"database_specific":{"vanir_signatures_modified":"2026-05-18T17:44:17Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-3058.json","vanir_signatures":[{"id":"CVE-2018-3058-054c046b","source":"https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613","deprecated":false,"target":{"file":"sql-common/client.c","function":"unpack_fields"},"signature_version":"v1","signature_type":"Function","digest":{"length":3281,"function_hash":"88964842003053574630259804416355278302"}},{"id":"CVE-2018-3058-404642c2","source":"https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613","deprecated":false,"target":{"file":"sql-common/client.c","function":"cli_read_rows"},"signature_version":"v1","signature_type":"Function","digest":{"length":2052,"function_hash":"30804943894516639331708306752096632231"}},{"id":"CVE-2018-3058-c0d67519","source":"https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613","deprecated":false,"target":{"file":"sql-common/client.c"},"signature_version":"v1","signature_type":"Line","digest":{"line_hashes":["78191142045503767829834019020932019650","250157719937173868004615858289264688140","312170375706132797718465719883724591296","15117071355854376419182426407334479680","140920309514825384561268578794081140775","130933521110411440899075290412605664940","28770826883863233939468445958714821618","49331132400223798885681869446783630656"],"threshold":0.9}},{"id":"CVE-2018-3058-c7d63e12","source":"https://github.com/mariadb/server/commit/50c426200224a4527e84052aa2ab32be893f43f4","deprecated":false,"target":{"file":"storage/sphinx/ha_sphinx.cc","function":"ha_sphinx::create"},"signature_version":"v1","signature_type":"Function","digest":{"length":3204,"function_hash":"212715881248758194619613885069756850581"}},{"id":"CVE-2018-3058-fd9a5a54","source":"https://github.com/mariadb/server/commit/50c426200224a4527e84052aa2ab32be893f43f4","deprecated":false,"target":{"file":"storage/sphinx/ha_sphinx.cc"},"signature_version":"v1","signature_type":"Line","digest":{"line_hashes":["249570897828672210811035826591486207304","322223126166962698284273532715400319885","270290635075884075638435410358092034776","297141217069259403319068516826314832701"],"threshold":0.9}}]}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"last_affected":"c0b4d74b52e7eec9b13af732193f7f8d7abe05de"},{"introduced":"0"},{"last_affected":"20bba957d2201fe8fdc427d386a278f265f53171"},{"last_affected":"df0bc0a67b5cca06665e1d501a2f74b712af5cf5"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"5.5.0"},{"last_affected":"5.5.60"},{"introduced":"5.6.0"},{"last_affected":"5.6.40"},{"introduced":"5.7.0"},{"last_affected":"5.7.22"}],"cpe":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"}}],"versions":["mysql-5.7.22","mysql-5.5.60","mysql-5.6.40","mysql-5.5.59","mysql-5.5.49","mysql-5.5.47","mysql-5.5.44","mysql-5.5.27","mysql-5.5.25","mysql-5.5.23","mysql-5.5.19","mysql-5.5.15","mysql-5.1.4","mysql-4.0.4","mysql-4.0.2","mysql-3.23.36","mysql-3.23.33","mysql-3.23.32","mysql-3.23.31","mysql-3.23.30-gamma","mysql-3.23.28-gamma","mysql-3.23.22-beta"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-3058.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}