April 2015 MySQL Vulnerabilities in Multiple NetApp Products

circle-check-alt This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

The email subscription feature has been temporarily disabled.

Summary

Multiple NetApp products incorporate Oracle MySQL. MySQL versions below 5.6.24 and 5.5.43 are susceptible to multiple vulnerabilities that could lead to the unauthorized ability to cause a hang or frequently repeatable crash (partial or complete DOS) of MySQL Server or the Operating System. This advisory will be updated as additional information becomes available.

Impact

Exploitation of this vulnerability may lead to successful unauthenticated or authenticated network attacks via multiple protocols or the unauthorized ability to cause a hang or frequently repeatable crash (partial or complete DOS) of MySQL Server or the Operating System.

Vulnerability Scoring Details

CVE Score Vector
CVE-2014-3569 4.3 (MEDIUM) AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0405 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0423 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0433 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0438 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0439 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0441 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0498 1.4 (LOW) AV:N/AC:H/Au:M/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0499 3.0 (LOW) AV:N/AC:M/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0500 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0501 4.8 (MEDIUM) AV:N/AC:M/Au:M/C:N/I:N/A:C/E:U/RL:U/RC:C
CVE-2015-0503 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0505 3.0 (LOW) AV:N/AC:M/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0506 3.0 (LOW) AV:N/AC:M/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0507 3.0 (LOW) AV:N/AC:M/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0508 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-0511 2.4 (LOW) AV:N/AC:M/Au:M/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-2566 2.4 (LOW) AV:N/AC:M/Au:M/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-2567 3.0 (LOW) AV:N/AC:M/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-2568 4.3 (MEDIUM) AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-2571 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C
CVE-2015-2573 3.4 (LOW) AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:U/RC:C

Exploitation and Public Announcements

NetApp is aware of public discussion of this vulnerability.

References

Affected Products

  • Cloud Manager
  • OnCommand Insight
  • OnCommand Performance Manager (Unified Manager Performance Pkg)
  • OnCommand Unified Manager for Clustered Data ONTAP
  • OnCommand Workflow Automation
  • StorageGRID (formerly StorageGRID Webscale)

Products Not Affected

  • 7-Mode Transition Tool
  • ATTO FibreBridge - 6500N
  • Brocade Fabric Operating System Firmware
  • Clustered Data ONTAP
  • Clustered Data ONTAP Antivirus Connector
  • E-Series SANtricity Storage Manager
  • E-Series SANtricity Web Services (REST API) for Web Services Proxy
  • FAS/AFF BIOS
  • Host Utilities - SAN for Linux
  • Host Utilities - SAN for Windows
  • NetApp Cloud Backup (formerly AltaVault)
  • NetApp Manageability SDK
  • NetApp NFS Plug-in for VMware VAAI
  • NetApp SANtricity SMI-S Provider
  • NetApp SMI-S Provider
  • NetApp Storage Encryption
  • OnCommand Balance
  • Open Systems SnapVault Agent
  • Service Processor
  • Single Mailbox Recovery
  • Snap Creator Framework
  • SnapDrive for Unix
  • SnapManager for Exchange
  • SnapManager for Hyper-V
  • SnapManager for Oracle
  • SnapManager for SAP
  • SnapManager for Sharepoint
  • Storage Services Connector
  • StorageGRID9 (9.x and prior)
  • System Manager 9.x

Software Versions and Fixes

NetApp's currently available patches are listed below.


Workarounds

Beginning with OnCommand Workflow Automation for Linux & Windows 4.2, OnCommand Unified Manager for Linux & Windows 7.2, SnapCenter Server 3.0, NetApp Service Level Manager 1.0, and OnCommand API Services 1.2 the MySQL software can be upgraded as specified in the product documentation. For assistance with the upgrade, please consult technical support.

OnCommand Insight 7.3.2 and higher on Linux and 7.3.9 and higher on Windows support upgrading MySQL. For assistance with the upgrade and access to the updated OnCommand Insight binaries, please consult technical support.

Obtaining Software Fixes

Software fixes will be made available through the NetApp Support website in the Software Download section.

https://mysupport.netapp.com/site/downloads/

Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.

Contact Information

Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)

Status of This Notice

Final.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20150417-0002

Revision History

Revision # Date Comments
1.0 20150417 Initial Public Release
2.0 20150423 Updated Affected Products
3.0 20150514 Updated Affected Products & Products Not Affected
4.0 20150519 Corrected the score for CVE-2015-0499
5.0 20150526 Updated Software Versions and Fixes
6.0 20150527 Updated Software Versions and Fixes
7.0 20150626 Added StorageGRID & StorageGRID Webscale to Affected Products
8.0 20150828 OnCommand Insight added to Software Versions and Fixes
9.0 20151016 OnCommand Workflow Automation added to Software Versions and Fixes
10.0 20151203 OnCommand Cloud Manager added to Software Versions and Fixes
11.0 20160831 Formatting
12.0 20160921 StorageGRID Webscale added to Software Versions and Fixes
13.0 20180731 StorageGRID moved to Products not Affected, Final status

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2022 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.