CVE-2016-6664
Published at:
-
13-12-2016 10:59
Last modified:
-
24-01-2023 05:09
Total changes:
-
3
Description
Common Vulnerability Scoring System (CVSS)
High
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
7.0
Base score
1.0
5.9
Exploitability score
Impact score
Verification logic
Reference
- 20161101 MySQL / MariaDB / PerconaDB - Privilege Escalation / Race Condition Exploit [CVE-2016-6663 / OCVE-2016-5616]-Mailing List, Third Party Advisory
- http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
- https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
- http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
- 40679-Exploit, Third Party Advisory, VDB Entry
- 93612-Third Party Advisory, VDB Entry
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- GLSA-201702-18-Third Party Advisory
- DSA-3770-Third Party Advisory
- RHSA-2017:2192-Third Party Advisory
- RHSA-2016:2749-Third Party Advisory
- RHSA-2016:2130-Third Party Advisory
- RHSA-2018:0279-Third Party Advisory
- RHSA-2018:0574-Third Party Advisory
- 20161104 MySQL / MariaDB / PerconaDB - Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )-Third Party Advisory, VDB Entry
Keywords