CVE-2012-2749 Details

CVE-2012-2749

Published: 2012-08-17
Last Modified: 2019-12-17
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index.

Analysis
Common Vulnerability Score System v2.0
Severity Medium
Base Score 4/10
Exploit Score 8/10
Access Vector Network
Access Complexity Low
Authentication Single
Impact Score 2.9/10
Confidentiality Impact None
Availability Impact Partial
Integrity Impact None
Vector String AV:N/AC:L/Au:S/C:N/I:N/A:P
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:* Yes - -
References

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html
http://rhn.redhat.com/errata/RHSA-2012-1462.html
http://rhn.redhat.com/errata/RHSA-2013-0180.html
http://secunia.com/advisories/51309
http://secunia.com/advisories/53372
http://security.gentoo.org/glsa/glsa-201308-06.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.securityfocus.com/bid/55120
https://bugzilla.redhat.com/show_bug.cgi?id=833737

CVE ID
CVE-2012-2749
Published
2012-08-17
Modified
2019-12-17
CVSSv2.0
Medium
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-399

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.