Vulnerability CVE-2016-6662: Information

Description

Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.

Severity: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Published: Sept. 20, 2016
Modified: Aug. 4, 2021
Error type identifier: CWE-264

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
  • Third Party Advisory
https://jira.mariadb.org/browse/MDEV-10465
  • Issue Tracking
  • Vendor Advisory
https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
  • Third Party Advisory
20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )
  • Mailing List
  • Third Party Advisory
https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
  • Release Notes
  • Vendor Advisory
https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
  • Release Notes
  • Vendor Advisory
[oss-security] 20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )
  • Mailing List
  • Third Party Advisory
https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
  • Release Notes
  • Vendor Advisory
40360
  • Exploit
  • Third Party Advisory
  • VDB Entry
92912
  • Third Party Advisory
  • VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
  • Patch
  • Vendor Advisory
GLSA-201701-01
  • Third Party Advisory
DSA-3666
  • Third Party Advisory
1036769
  • Third Party Advisory
  • VDB Entry
RHSA-2017:0184
  • Third Party Advisory
RHSA-2016:2928
  • Third Party Advisory
RHSA-2016:2927
  • Third Party Advisory
RHSA-2016:2749
  • Third Party Advisory
RHSA-2016:2595
  • Third Party Advisory
RHSA-2016:2131
  • Third Party Advisory
RHSA-2016:2130
  • Third Party Advisory
RHSA-2016:2077
  • Third Party Advisory
RHSA-2016:2062
  • Third Party Advisory
RHSA-2016:2061
  • Third Party Advisory
RHSA-2016:2060
  • Third Party Advisory
RHSA-2016:2059
  • Third Party Advisory
RHSA-2016:2058
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
      Start including
      5.5.0
      End including
      5.5.52

      cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
      Start including
      5.6.0
      End including
      5.6.33

      cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
      Start including
      5.7.0
      End including
      5.7.15

      Configuration 2

      cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
      Start including
      5.5
      End excliding
      5.5.51-38.1

      cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
      Start including
      5.6
      End excliding
      5.6.32-78.0

      cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
      Start including
      5.7
      End excliding
      5.7.14-7

      Configuration 3

      cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
      Start including
      5.5.20
      End excliding
      5.5.51

      cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
      Start including
      10.0.0
      End excliding
      10.0.27

      cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
      Start including
      10.1.0
      End excliding
      10.1.17

      Configuration 4

      cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

      Configuration 5

      cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*