CVE-2012-0087 Details

CVE-2012-0087

Published: 2012-01-18
Last Modified: 2019-12-17
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102.

Analysis
Common Vulnerability Score System v2.0
Severity Medium
Base Score 4/10
Exploit Score 8/10
Access Vector Network
Access Complexity Low
Authentication Single
Impact Score 2.9/10
Confidentiality Impact None
Availability Impact Partial
Integrity Impact None
Vector String AV:N/AC:L/Au:S/C:N/I:N/A:P
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:* Yes - -
References

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html
http://osvdb.org/78377
http://secunia.com/advisories/48250
http://secunia.com/advisories/53372
http://security.gentoo.org/glsa/glsa-201308-06.xml
http://www.debian.org/security/2012/dsa-2429
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
http://www.securityfocus.com/bid/51509
http://www.ubuntu.com/usn/USN-1397-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/72519

CVE ID
CVE-2012-0087
Published
2012-01-18
Modified
2019-12-17
CVSSv2.0
Medium
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.