CVE-2016-6662 (CNNVD-201609-183)
中文标题:
Oracle MySQL 远程代码执行漏洞/提权漏洞
英文标题:
Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, ...
漏洞描述
中文描述:
Oracle MySQL是美国甲骨文(Oracle)公司的一套开源的关系数据库管理系统。该数据库系统具有性能高、成本低、可靠性好等特点。 Oracle MySQL中的配置文件(my.cnf)存在远程代码执行漏洞。攻击者(本地或远程)可通过授权访问MySQL数据库(网络连接或类似phpMyAdmin的Web接口)或SQL注入方式,利用该漏洞向配置文件中注入恶意的数据库配置,导致以root权限执行任意代码,完全控制受影响的服务器。以下版本受到影响:Oracle MySQL 5.5.52及之前的版本,5.6.x至5.6.33版本,5.7.x至5.7.15版本;MariaDB 5.5.51之前的版本,10.0.27之前的10.0.x版本,10.1.17之前的10.1.x版本;Percona Server 5.5.51-38.1之前的版本,5.6.32-78.0之前的5.6.x版本,5.7.14-7之前的5.7.x版本。
英文描述:
Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| oracle | mysql | * | - | - |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
| percona | percona_server | * | - | - |
cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*
|
| mariadb | mariadb | * | - | - |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| redhat | openstack | 5.0 | - | - |
cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
|
| redhat | openstack | 6.0 | - | - |
cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
|
| redhat | openstack | 7.0 | - | - |
cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
|
| redhat | openstack | 8 | - | - |
cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
|
| redhat | openstack | 9 | - | - |
cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_eus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_eus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_eus | 7.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_eus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2016-6662 |
2025-11-11 15:19:10 | 2025-11-11 07:34:23 |
| NVD | nvd_CVE-2016-6662 |
2025-11-11 14:55:09 | 2025-11-11 07:43:03 |
| CNNVD | cnnvd_CNNVD-201609-183 |
2025-11-11 15:09:42 | 2025-11-11 07:52:41 |
| EXPLOITDB | exploitdb_EDB-40360 |
2025-11-11 15:05:25 | 2025-11-11 08:40:21 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 27 -> 30
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 权限许可和访问控制问题
- cnnvd_id: 未提取 -> CNNVD-201609-183
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 9.8
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 24
- data_sources: ['cve'] -> ['cve', 'nvd']