CVE-2016-6662

Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
References
Link Resource
http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html Third Party Advisory
https://jira.mariadb.org/browse/MDEV-10465 Issue Tracking Vendor Advisory
https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/ Third Party Advisory
http://seclists.org/fulldisclosure/2016/Sep/23 Mailing List Third Party Advisory
https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/ Release Notes Vendor Advisory
https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/ Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/09/12/3 Mailing List Third Party Advisory
https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/ Release Notes Vendor Advisory
https://www.exploit-db.com/exploits/40360/ Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/92912 Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Patch Vendor Advisory
https://security.gentoo.org/glsa/201701-01 Third Party Advisory
http://www.debian.org/security/2016/dsa-3666 Third Party Advisory
http://www.securitytracker.com/id/1036769 Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2017-0184.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2928.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2927.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2749.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2595.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2131.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2130.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2077.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2062.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2061.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2060.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2059.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2058.html Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*

Information

Published : 2016-09-20 11:59

Updated : 2021-08-04 10:15


NVD link : CVE-2016-6662

Mitre link : CVE-2016-6662


JSON object : View

CWE
CWE-264

Permissions, Privileges, and Access Controls

Advertisement

dedicated server usa

Products Affected

redhat

  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • openstack
  • enterprise_linux_workstation
  • enterprise_linux
  • enterprise_linux_server_tus
  • enterprise_linux_server_eus
  • enterprise_linux_server

oracle

  • mysql

mariadb

  • mariadb

percona

  • percona_server

debian

  • debian_linux