October 2018 MySQL Vulnerabilities in NetApp Products
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
Subscribe to NTAP-20181018-0002 updates
Subscribe to NTAP-20181018-0002 advisory updates
Unsubscribe from NTAP-20181018-0002 advisory updates
Unsubscribe from NTAP-20181018-0002 advisory updates
Advisory ID: NTAP-20181018-0002 Version: 7.0 Last updated: 01/18/2021 Status: Final. CVEs: CVE-2018-11776, CVE-2018-8014, CVE-2018-3258, CVE-2018-1258, CVE-2016-9843, CVE-2018-3155, CVE-2018-3143, CVE-2018-3156, CVE-2018-3251, CVE-2018-3182, CVE-2018-3137, CVE-2018-3203, CVE-2018-3133, CVE-2018-3145, CVE-2018-3144, CVE-2018-3185, CVE-2018-3195, CVE-2018-3247, CVE-2018-3187, CVE-2018-3174, CVE-2018-3171, CVE-2018-3277, CVE-2018-3162, CVE-2018-3173, CVE-2018-3200, CVE-2018-3170, CVE-2018-3212, CVE-2018-3280, CVE-2018-3276, CVE-2018-3186, CVE-2018-3161, CVE-2018-3278, CVE-2018-3279, CVE-2018-3282, CVE-2018-3285, CVE-2018-3284, CVE-2018-3283, CVE-2018-3286
Summary
Multiple NetApp products incorporate Oracle MySQL. MySQL versions through 5.5.61, 5.6.41, 5.7.23, and 8.0.12 are susceptible to multiple vulnerabilities that could lead to unauthorized takeover of MySQL Server, unauthorized read or modification access to a subset or all MySQL Server accessible data, or to cause a hang or frequently repeatable crash (partial or complete DoS) of MySQL Server.
Impact
Successful exploitation of these vulnerabilities may lead to unauthorized takeover of MySQL Server, unauthorized read or modification access to a subset or all MySQL Server accessible data, or to a hang or frequently repeatable crash (partial or complete DoS) of MySQL Server.
Vulnerability Scoring Details
CVE | Score | Vector |
---|---|---|
CVE-2016-9843 | 8.8 (HIGH) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2018-11776 | 9.8 (CRITICAL) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVE-2018-1258 | 8.8 (HIGH) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2018-3133 | 6.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3137 | 6.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3143 | 6.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3144 | 5.9 (MEDIUM) | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3145 | 6.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3155 | 7.7 (HIGH) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |
CVE-2018-3156 | 6.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3161 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3162 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3170 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3171 | 5.0 (MEDIUM) | CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H |
CVE-2018-3173 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3174 | 5.3 (MEDIUM) | CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H |
CVE-2018-3182 | 6.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3185 | 5.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H |
CVE-2018-3186 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3187 | 5.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H |
CVE-2018-3195 | 5.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H |
CVE-2018-3200 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3203 | 6.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3212 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3247 | 5.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H |
CVE-2018-3251 | 6.5 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3258 | 8.8 (HIGH) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVE-2018-3276 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3277 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3278 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3279 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3280 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3282 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3283 | 4.4 (MEDIUM) | CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3284 | 4.4 (MEDIUM) | CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3285 | 4.9 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2018-3286 | 4.3 (MEDIUM) | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
CVE-2018-8014 | 9.8 (CRITICAL) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Exploitation and Public Announcements
NetApp is aware of public discussion of this vulnerability.
References
Affected Products
- Active IQ Unified Manager (formerly OnCommand Unified Manager) for VMware vSphere 9.5 and above
- Active IQ Unified Manager (formerly OnCommand Unified Manager) for Windows 7.3 and above
- OnCommand Insight
- OnCommand Workflow Automation
- SnapCenter
Products Not Affected
- 7-Mode Transition Tool
- ATTO FibreBridge - 6500N
- Active IQ Unified Manager (formerly OnCommand Unified Manager) for Linux 7.3 and above
- Brocade Fabric Operating System Firmware
- Brocade Network Advisor Software
- Clustered Data ONTAP
- Clustered Data ONTAP Antivirus Connector
- E-Series SANtricity OS Controller Software 11.x
- E-Series SANtricity Storage Manager
- E-Series SANtricity Web Services (REST API) for Web Services Proxy
- Element Plug-in for vCenter Server
- FAS/AFF BIOS
- FAS/AFF Baseboard Management Controller (BMC)
- Host Utilities - SAN for Linux
- Host Utilities - SAN for Windows
- MetroCluster Tiebreaker for clustered Data ONTAP
- NetApp Cloud Backup (formerly AltaVault)
- NetApp Cloud Backup OST Plug-in (formerly AltaVault OST Plug-in)
- NetApp Converged Systems Advisor Agent
- NetApp HCI Compute Node (Bootstrap OS)
- NetApp HCI Compute Node BIOS
- NetApp Manageability SDK
- NetApp NFS Plug-in for VMware VAAI
- NetApp SANtricity Cloud Connector
- NetApp SANtricity SMI-S Provider
- NetApp SMI-S Provider
- NetApp Service Level Manager
- NetApp SolidFire & HCI Management Node
- NetApp SolidFire & HCI Storage Node (Element Software)
- NetApp Storage Encryption
- NetApp VASA Provider for Clustered Data ONTAP 7.2 and above
- ONTAP Select Deploy administration utility
- OnCommand API Services
- OnCommand Cloud Manager
- OnCommand System Manager 9.x
- OnCommand Unified Manager for 7-Mode (core package)
- Open Systems SnapVault Agent
- Service Processor
- Single Mailbox Recovery
- Snap Creator Framework
- SnapDrive for Unix
- SnapDrive for Windows
- SnapManager for Exchange
- SnapManager for Hyper-V
- SnapManager for MS SQL
- SnapManager for Oracle
- SnapManager for SAP
- SnapManager for Sharepoint
- Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 7.2 and above
- Storage Replication Adapter for Clustered Data ONTAP for Windows 7.2 and above
- Storage Services Connector
- StorageGRID (formerly StorageGRID Webscale)
- StorageGRID Baseboard Management Controller (BMC)
- StorageGRID9 (9.x and prior)
- Virtual Storage Console for VMware vSphere 7.2 and above
Software Versions and Fixes
NetApp's currently available patches are listed below.
Product | First Fixed in Release |
---|---|
SnapCenter |
https://mysupport.netapp.com/NOW/download/software/snapcenter/4.1P3/ |
Active IQ Unified Manager (formerly OnCommand Unified Manager) for VMware vSphere 9.5 and above |
https://mysupport.netapp.com/products/oncommand_um/9.5/ https://mysupport.netapp.com/products/oncommand_um/9.4P1/ |
OnCommand Insight |
https://mysupport.netapp.com/products/oncommand_insight/7.3.5/ |
OnCommand Workflow Automation |
https://mysupport.netapp.com/products/ocwfa/5.0/ |
Active IQ Unified Manager (formerly OnCommand Unified Manager) for Windows 7.3 and above |
https://mysupport.netapp.com/products/oncommand_um/9.5/ https://mysupport.netapp.com/products/oncommand_um/9.4P1/ |
Workarounds
Beginning with OnCommand Workflow Automation for Linux & Windows 4.2, OnCommand Unified Manager for Linux & Windows 7.2, SnapCenter Server 3.0, NetApp Service Level Manager 1.0, and OnCommand API Services 1.2 the MySQL software can be upgraded as specified in the product documentation. For assistance with the upgrade, please consult technical support.
OnCommand Insight 7.3.2 and higher on Linux and 7.3.9 and higher on Windows supports upgrading MySQL. For assistance with the upgrade and access to the updated OnCommand Insight binaries, please consult technical support.
Obtaining Software Fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.
https://mysupport.netapp.com/site/downloads/
Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.
Contact Information
Check http://mysupport.netapp.com for further
updates.
For questions, contact NetApp at:
Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)
Status of This Notice
Final.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20181018-0002
Revision History
Revision # | Date | Comments |
---|---|---|
1.0 | 20181018 | Initial Public Release |
2.0 | 20181025 | Storage Automation Store moved to Affected Products |
3.0 | 20181112 | OnCommand Insight moved to Affected Products and added to Workarounds |
4.0 | 20181122 | SnapCenter Server added to Software Versions and Fixes |
5.0 | 20181221 | OnCommand Unified Manager for Windows 7.3 and above and OnCommand Unified Manager for VMware vSphere 7.3 and above added to Software Versions and Fixes |
6.0 | 20190208 | OnCommand Workflow Automation added to Software Versions and Fixes |
7.0 | 20210118 | OnCommand Cloud Manager moved to Products Not Affected, Final status |
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.