CVE-2017-10789 Affecting libdbd-mysql-perl package, versions <4.046-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.19% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-LIBDBDMYSQLPERL-1549868
  • published1 Jul 2017
  • disclosed1 Jul 2017

Introduced: 1 Jul 2017

CVE-2017-10789  (opens in a new tab)

How to fix?

Upgrade Debian:12 libdbd-mysql-perl to version 4.046-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libdbd-mysql-perl package and not the libdbd-mysql-perl package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.