Cleartext Transmission of Sensitive Information Affecting percona-xtradb-cluster-5.6 package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.18% (57th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1604-PERCONAXTRADBCLUSTER56-365337
  • published24 Apr 2017
  • disclosed24 Apr 2017

Introduced: 24 Apr 2017

CVE-2017-3305  (opens in a new tab)
CWE-319  (opens in a new tab)

How to fix?

There is no fixed version for Ubuntu:16.04 percona-xtradb-cluster-5.6.

NVD Description

Note: Versions mentioned in the description apply only to the upstream percona-xtradb-cluster-5.6 package and not the percona-xtradb-cluster-5.6 package as distributed by Ubuntu. See How to fix? for Ubuntu:16.04 relevant fixed versions and status.

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.55 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue allows man-in-the-middle attackers to hijack the authentication of users by leveraging incorrect ordering of security parameter verification in a client, aka, "The Riddle".