January 2018 MySQL vulnerabilities in NetApp Products

Summary

Multiple NetApp products incorporate Oracle MySQL. MySQL versions through 5.5.58, 5.6.38 and 5.7.20 are susceptible to multiple vulnerabilities that could lead to unauthorized takeover of MySQL Server, unauthorized read or modification access to a subset or all MySQL Server accessible data, or to a hang or frequently repeatable crash (partial or complete DoS) of MySQL Server.

Impact

Successful exploitation of these vulnerabilities may lead to unauthorized takeover of MySQL Server, unauthorized read or modification access to a subset or all MySQL Server accessible data, or to a hang or frequently repeatable crash (partial or complete DoS) of MySQL Server.

Vulnerability Scoring Details

CVE Score Vector
CVE-2017-12617 8.1 (HIGH) CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2017-3736 5.9 (MEDIUM) CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2017-3737 5.9 (MEDIUM) CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2018-2562 7.1 (HIGH) CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2018-2565 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2573 6.5 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2576 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2583 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2585 7.5 (HIGH) CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2586 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2590 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2591 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2600 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2612 6.5 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
CVE-2018-2622 6.5 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2640 6.5 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2645 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVE-2018-2646 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2647 5.5 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
CVE-2018-2665 6.5 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2667 4.9 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2668 6.5 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2696 7.5 (HIGH) CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2018-2703 6.5 (MEDIUM) CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Exploitation and Public Announcements

NetApp is aware of public discussion of this vulnerability.

References

Affected Products

  • OnCommand Cloud Manager
  • OnCommand Insight
  • OnCommand Unified Manager for VMware vSphere for 7.2 and above
  • OnCommand Unified Manager for Windows for 7.2 and above
  • OnCommand Workflow Automation
  • SnapCenter Server

Products Under Investigation

  • Storage Automation Store

Products Not Affected

  • 7-Mode Transition Tool
  • ATTO FibreBridge
  • Active IQ Performance Analytics Services
  • AltaVault OST Plug-in
  • AutoSupport, MySupport,support.netapp.com
  • Brocade Fabric Operating System Firmware
  • Brocade Network Advisor Software
  • Brocade Network Operating System Firmware
  • Cloud Control
  • Cluster Network Switch (NetApp CN1610)
  • Clustered Data ONTAP
  • Clustered Data ONTAP Antivirus Connector
  • Data Migration Appliance DTA2800 (DTA Firmware)
  • Data Migration Appliance DTA2800 (DTA Manager)
  • Data Migration Appliance DTA2800 (DTA Remote CLI)
  • Data Migration Appliance DTA2800 (Space Reclamation Utility)
  • Data ONTAP Edge
  • Data ONTAP operating in 7-Mode
  • E-Series SANtricity Cloud Connector
  • E-Series SANtricity Management Plug-ins (Microsoft SQL Server (SSMS))
  • E-Series SANtricity Management Plug-ins (Microsoft System Center (SCOM))
  • E-Series SANtricity Management Plug-ins (Oracle EM)
  • E-Series SANtricity Management Plug-ins (VMware SRA)
  • E-Series SANtricity Management Plug-ins (VMware VASA (Windows))
  • E-Series SANtricity Management Plug-ins (VMware vCenter (Linux))
  • E-Series SANtricity Management Plug-ins (VMware vCenter (Windows))
  • E-Series SANtricity OS Controller Software 11.30 and later
  • E-Series SANtricity OS Controller Software 8.x
  • E-Series SANtricity Storage Manager
  • E-Series SANtricity Web Services (REST API) for Web Services Proxy
  • FAS/AFF System Firmware (BIOS)
  • Host Utilities - SAN for ESX
  • Host Utilities - SAN for Unix and Linux
  • Host Utilities - SAN for Windows
  • MetroCluster Tiebreaker for clustered Data ONTAP
  • Multipath I/O (Data ONTAP DSM for Windows MPIO)
  • NetApp AltaVault
  • NetApp Converged Systems Advisor
  • NetApp HCI Compute Nodes
  • NetApp HCI Storage Nodes
  • NetApp Host Agent
  • NetApp Manageability SDK
  • NetApp NFS Plug-in for VMware VAAI
  • NetApp Plug-in for Symantec NetBackup
  • NetApp SANtricity SMI-S Provider
  • NetApp SMI-S Provider
  • NetApp Service Level Manager
  • NetApp Storage Encryption
  • NetApp VASA Provider for Clustered Data ONTAP 7.0 and above
  • ONTAP Select Deploy administration utility
  • OnCommand API Services
  • OnCommand Plug-in for Microsoft
  • OnCommand Shift
  • OnCommand System Manager
  • OnCommand Unified Manager for 7-mode (core package)
  • OnCommand Unified Manager for Linux for 7.2 and above
  • Open Systems SnapVault Agent
  • Perfstat
  • RAID Controller CTS2600 Legacy Engenio
  • Service Processor
  • Single Mailbox Recovery
  • Snap Creator Framework
  • SnapDrive for Unix
  • SnapDrive for Windows
  • SnapManager for Exchange
  • SnapManager for Hyper-V
  • SnapManager for MS SQL
  • SnapManager for Oracle
  • SnapManager for SAP
  • SnapManager for Sharepoint
  • SnapProtect
  • SolidFire Element OS
  • SolidFire VMware vCenter Plug-in
  • Storage Replication Adapter for 7-Mode Data ONTAP
  • Storage Replication Adapter for Clustered Data ONTAP 7.0 and above
  • Storage Services Connector
  • StorageGRID
  • StorageGRID Webscale
  • System Setup
  • Virtual Storage Console for VMware vSphere 7.0 and above

Software Versions and Fixes

None.

This section will be updated as patches are released.

Workarounds

None at this time.

Obtaining Software Fixes

Software fixes will be made available through the NetApp Support website in the Software Download section.

https://mysupport.netapp.com/NOW/cgi-bin/software/

Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.

Contact Information

Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)

Status of This Notice

Interim.

NetApp will continue to update this advisory as additional information becomes available.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp.

This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20180117-0002

Revision History

Revision # Date Comments
1.0 20180117 Initial Public Release
2.0 20180119 OnCommand Unified Manager for Windows for 7.2 and above and OnCommand Unified Manager for VMware vSphere for 7.2 and above moved to Affected Products
3.0 20180123 OnCommand Workflow Automation moved to Affected Products
4.0 20180124 OnCommand Cloud Manager moved to Affected Products, StorageGRID and StorageGRID Webscale moved to Products Not Affected
5.0 20180201 SnapCenter Server moved to Affected Products

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2017 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.