SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Juniper Junos Space Vendors:   Juniper
(Juniper Issues Fix for Juniper Junos Space) MySQL Multiple Bugs Let Remote and Local Users Deny Service and Remote Authenticated Users Partially Access and Modify Data
SecurityTracker Alert ID:  1033840
SecurityTracker URL:  http://securitytracker.com/id/1033840
CVE Reference:   CVE-2015-2620   (Links to External Site)
Date:  Oct 16 2015
Impact:   Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 15.1R1
Description:   Multiple vulnerabilities were reported in MySQL. A remote authenticated user can partially access data on the target system. A remote authenticated user can partially modify data on the target system. A remote or local user can cause partial denial of service conditions on the target system. Juniper Junos Space is affected.

A remote authenticated user can exploit a flaw in the MySQL Server Partition component to partially access data, partially modify data, and partially deny service [CVE-2015-2617].

A remote authenticated user can exploit a flaw in the MySQL Server DML component to cause partial denial of service conditions [CVE-2015-2648].

A remote authenticated user can exploit a flaw in the MySQL Server DML component to cause partial denial of service conditions [CVE-2015-2611].

A remote authenticated user can exploit a flaw in the MySQL Server GIS component to cause partial denial of service conditions [CVE-2015-2582].

A remote authenticated user can exploit a flaw in the MySQL Server I_S component to cause partial denial of service conditions [CVE-2015-4752].

A remote authenticated user can exploit a flaw in the MySQL Server InnoDB component to cause partial denial of service conditions [CVE-2015-4756].

A remote authenticated user can exploit a flaw in the MySQL Server Optimizer component to cause partial denial of service conditions [CVE-2015-2643].

A remote authenticated user can exploit a flaw in the MySQL Server Partition component to cause partial denial of service conditions [CVE-2015-4772].

A remote authenticated user can exploit a flaw in the MySQL Server Memcached component to cause partial denial of service conditions [CVE-2015-4761].

A remote authenticated user can exploit a flaw in the MySQL Server Optimizer component to cause partial denial of service conditions [CVE-2015-4757].

A remote authenticated user can exploit a flaw in the MySQL Server Pluggable Auth component to partially access data [CVE-2015-4737].

A remote authenticated user can exploit a flaw in the MySQL Server RBR component to cause partial denial of service conditions [CVE-2015-4771].

A remote authenticated user can exploit a flaw in the MySQL Server Firewall component to cause partial denial of service conditions [CVE-2015-4769].

A remote authenticated user can exploit a flaw in the MySQL Server Firewall component to partially modify data [CVE-2015-2639].

A remote authenticated user can exploit a flaw in the MySQL Server Privileges component to partially access data [CVE-2015-2620].

A remote authenticated user can exploit a flaw in the MySQL Server component to cause partial denial of service conditions [CVE-2015-2641].

A local user can exploit a flaw in the MySQL Server Client component to cause partial denial of service conditions [CVE-2015-2661].

A remote user can exploit a flaw in the MySQL Server Firewall component to cause partial denial of service conditions [CVE-2015-4767].

The following researchers reported these and other Oracle product vulnerabilities:

Adam Willard of Foreground Security; an Anonymous researcher via Beyond Security's SecuriTeam Secure Disclosure Program; Aniway.Anyway via HP's Zero Day Initiative; Arezou Hosseinzad-Amirkhizi of TELUS Security Labs; Benjamin Kunz Mejri of Evolution Security;
Borked of the Google Security Team; CERT/CC; Christiaan Esterhuizen of Trustwave; Christian Schneider; Danny Tsechansky; David Jorm; David Litchfield of Google; Derek Abdine of rapid7.com; Florian Lukavsky of SEC Consult Vulnerability Lab;
Florian Weimer of Red Hat; Hanno Bock; Jacob Smith; Juraj Somorovsky of Ruhr-University Bochum; Jorg Schwenk of Ruhr-University Bochum; Karthikeyan Bhargavan; Kyle Lovett; Martin Rakhmanov of Trustwave; Mateusz Jurczyk of Google Project Zero;
Microsoft Vulnerability Research of Microsoft Corp; Owais Mohammad Khan formerly of KPMG; Recx Ltd.; Richard Birkett of Worldpay; Richard Harrison of E.ON Business Services GmbH; Roberto Suggi Liverani of NATO Communications and Information Agency;
Sandeep Kamble of SecureLayer7; Steven Seeley of HP's Zero Day Initiative; Tibor Jager of Ruhr-University Bochum; Tudor Enache of Help AG; and Vladimir Wolstencroft.

Impact:   A remote authenticated user can partially access data on the target system.

A remote authenticated user can partially modify data on the target system.

A local user can cause partial denial of service conditions on the target system.

A remote user can cause partial denial of service conditions.

Solution:   Juniper has issued a fix for CVE-2015-2620 for Juniper Junos Space (15.1R1).

The Juniper advisory is available at:

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698

Vendor URL:  kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 (Links to External Site)
Cause:   Not specified

Message History:   This archive entry is a follow-up to the message listed below.
Jul 15 2015 MySQL Multiple Bugs Let Remote and Local Users Deny Service and Remote Authenticated Users Partially Access and Modify Data



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC