PatchSiren cyber security CVE debrief
CVE-2017-3243 Redhat CVE debrief
CVE-2017-3243 is a denial-of-service issue in the MySQL Server component of Oracle MySQL, specifically the Server: Charsets subcomponent. According to the NVD record, affected Oracle MySQL versions include 5.5.53 and earlier, and the impact is a hang or frequently repeatable crash of the server. Oracle’s advisory is listed as the patch/vendor reference, and NVD also maps related downstream package and operating-system CPEs, so administrators should verify whether their vendor build includes a backport or separate fix.
- Vendor
- Redhat
- Product
- CVE-2017-3243
- CVSS
- MEDIUM 4.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-27
- Advisory updated
- 2026-05-13
Who should care
Database administrators and platform teams running Oracle MySQL 5.5.53 or earlier should pay attention, especially if administrative or other high-privilege network access is exposed. Downstream Linux distribution maintainers and operators using vendor-packaged MySQL/MariaDB builds should also check their package errata, since NVD includes Debian, Red Hat, and MariaDB-related vulnerable CPEs.
Technical summary
The public record describes a MySQL Server vulnerability in the Charsets area with an availability-only outcome: unauthorized ability to cause a hang or a frequently repeatable crash of MySQL Server. The NVD CVSS v3.1 vector is AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H, indicating remote access is possible but requires high privileges and has no confidentiality or integrity impact. NVD does not assign a specific CWE beyond NVD-CWE-noinfo, so the exact coding flaw is not detailed in the supplied corpus.
Defensive priority
Medium. The issue is limited to denial of service and requires high privileges, but it can still take down a database service and may be relevant in environments where privileged remote administration is common or where legacy 5.5 deployments remain in use.
Recommended defensive actions
- Confirm whether any Oracle MySQL deployments are at version 5.5.53 or earlier and schedule an upgrade or vendor backport immediately.
- Apply the Oracle January 2017 CPU fix, or the equivalent downstream vendor advisory/errata for your distribution package.
- Check vendor package metadata for affected MariaDB, Debian, and Red Hat builds to ensure the fix was backported into your OS packages.
- Restrict network access to high-privilege MySQL administrative paths and review who can authenticate with elevated database permissions.
- Monitor for server hangs or repeatable crashes in MySQL service health checks and ensure restart/HA recovery procedures are tested.
- Treat this as a routine but timely patch item rather than an emergency exploit-mitigation event, given the high-privilege prerequisite and availability-only impact.
Evidence notes
The debrief is based on the supplied NVD record and its referenced Oracle CPU advisory. NVD states the vulnerable Oracle MySQL range as 5.5.0 through 5.5.53, describes the impact as a hang or frequently repeatable crash, and assigns CVSS v3.1 AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H. The record also lists downstream vulnerable CPEs for MariaDB, Debian 8, and multiple Red Hat Enterprise Linux variants, which supports checking vendor-specific backports. Published date in the supplied corpus is 2017-01-27; the later modified date of 2026-05-13 reflects record maintenance, not initial disclosure.
Official resources
-
CVE-2017-3243 CVE record
CVE.org
-
CVE-2017-3243 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Broken Link, Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed in the CVE/NVD record on 2017-01-27. The supplied corpus shows a later record modification on 2026-05-13, but no KEV listing or exploitation evidence. Advisory and patch references are present in the official NVD metadata