{"id":"CVE-2020-14550","details":"Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).","aliases":["BIT-mariadb-2020-14550","BIT-mariadb-min-2020-14550","BIT-mysql-client-2020-14550"],"modified":"2026-03-19T12:46:40.711020Z","published":"2020-07-15T18:15:18.147Z","related":["ALSA-2020:3732","CGA-xjjj-v976-7gg2"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202105-27"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210622-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4441-1/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"e48d775c6f066add457fa8cfb2ebc4d5ff0c7613"},{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"2e5681a450627709512138a7d15b8ee035a29c6a"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"1025363a35571d5a0ba7023287104d23c7aa61d5"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"bb045e7931c451b228ffc5bcdb1791a31eb0c852"}],"database_specific":{"versions":[{"introduced":"5.5.0"},{"fixed":"5.5.61"},{"introduced":"10.0.0"},{"fixed":"10.0.35"},{"introduced":"10.1.0"},{"fixed":"10.1.33"},{"introduced":"10.2.0"},{"fixed":"10.2.15"}]}},{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"2acf164f591dafa204a8867a0c4618f4aa420fe5"},{"introduced":"0"},{"last_affected":"b17eb938b91d457c0fbdc3c4691cf3b810e32a15"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"7d10c82196c8e45554f27c00681474a9fb86d137"}],"database_specific":{"versions":[{"introduced":"5.6.0"},{"last_affected":"5.6.48"},{"introduced":"5.7.0"},{"last_affected":"5.7.30"},{"introduced":"8.0.0"},{"last_affected":"8.0.20"}]}}],"versions":["mariadb-10.1.0","mysql-5.5.42","mysql-5.5.43","mysql-5.5.44","mysql-5.5.45","mysql-5.5.46","mysql-5.5.47","mysql-5.5.48","mysql-5.5.49","mysql-5.5.50","mysql-5.5.51","mysql-5.5.52","mysql-5.5.53","mysql-5.5.54","mysql-5.5.55","mysql-5.5.56","mysql-5.5.57","mysql-5.5.58","mysql-5.5.59","mysql-5.5.60","mysql-5.5.61","mysql-5.5.62","mysql-5.5.63","mysql-5.6.33","mysql-5.6.34","mysql-5.6.35","mysql-5.6.36","mysql-5.6.37","mysql-5.6.38","mysql-5.6.39","mysql-5.6.40","mysql-5.6.41","mysql-5.6.42","mysql-5.6.43","mysql-5.6.45","mysql-5.6.46","mysql-5.6.47","mysql-5.6.48","mysql-8.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14550.json","vanir_signatures":[{"signature_type":"Function","target":{"file":"sql-common/client.c","function":"unpack_fields"},"source":"https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613","deprecated":false,"id":"CVE-2020-14550-054c046b","signature_version":"v1","digest":{"function_hash":"88964842003053574630259804416355278302","length":3281}},{"signature_type":"Function","target":{"file":"sql-common/client.c","function":"cli_read_rows"},"source":"https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613","deprecated":false,"id":"CVE-2020-14550-404642c2","signature_version":"v1","digest":{"function_hash":"30804943894516639331708306752096632231","length":2052}},{"signature_type":"Line","target":{"file":"sql-common/client.c"},"source":"https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613","deprecated":false,"id":"CVE-2020-14550-c0d67519","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["78191142045503767829834019020932019650","250157719937173868004615858289264688140","312170375706132797718465719883724591296","15117071355854376419182426407334479680","140920309514825384561268578794081140775","130933521110411440899075290412605664940","28770826883863233939468445958714821618","49331132400223798885681869446783630656"]}}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}