CVE-2016-6663

CVSS V2 Medium 4.4 CVSS V3 High 7
Description
Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
Overview
  • CVE ID
  • CVE-2016-6663
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2016-12-13T21:59:00
  • Last Modified Date
  • 2019-03-05T18:23:02
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* 1 OR 5.5.0 5.5.52
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* 1 OR 5.6.0 5.6.33
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* 1 OR 5.7.0 5.7.15
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:* 1 OR 5.5 5.5.51-38.2
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:* 1 OR 5.6 5.6.32-78.1
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:* 1 OR 5.7 5.7.14-8
cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:* 1 OR 5.5 5.5.41-37.0
cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:* 1 OR 5.6 5.6.32-25.17
cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:* 1 OR 5.7 5.7.14-26.17
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 5.5.20 5.5.52
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.0.0 10.0.28
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.1.0 10.1.18
cpe:2.3:a:oracle:mysql:8.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • LOCAL
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.4
  • Severity
  • MEDIUM
  • Exploitability Score
  • 3.4
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
http://seclists.org/fulldisclosure/2016/Nov/4 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/92911 Third Party Advisory VDB Entry
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html Issue Tracking Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/10/25/4 Mailing List Third Party Advisory
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805 Issue Tracking Patch Third Party Advisory
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html Exploit Third Party Advisory
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ Release Notes Vendor Advisory
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html Issue Tracking Vendor Advisory
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ Vendor Advisory
https://www.exploit-db.com/exploits/40678/ Exploit Third Party Advisory VDB Entry
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html Issue Tracking Vendor Advisory
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ Release Notes Vendor Advisory
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html Issue Tracking Vendor Advisory
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291 Issue Tracking Patch Third Party Advisory
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ Release Notes Vendor Advisory
http://www.securityfocus.com/bid/93614 Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2017-0184.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2928.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2927.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2749.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2595.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2131.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2130.html Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 07:56:56 Added to TrackCVE
2022-12-02 12:24:39 2016-12-13T21:59Z 2016-12-13T21:59:00 CVE Published Date updated
2022-12-02 12:24:39 2019-03-05T18:23:02 CVE Modified Date updated
2022-12-02 12:24:39 Analyzed Vulnerability Status updated