PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-3258 Redhat CVE debrief

CVE-2017-3258 is a MySQL Server DDL weakness that can let a low-privileged network attacker trigger a hang or frequently repeatable crash, resulting in denial of service. Oracle’s advisory and the NVD record place affected Oracle MySQL releases at 5.5.53 and earlier, 5.6.34 and earlier, and 5.7.16 and earlier. NVD also maps downstream MariaDB and Linux distribution package entries for the same CVE. The published CVSS v3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H.

Vendor
Redhat
Product
CVE-2017-3258
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-27
Original CVE updated
2026-05-13
Advisory published
2017-01-27
Advisory updated
2026-05-13

Who should care

Database administrators, platform teams, and Linux package maintainers running exposed MySQL or MariaDB services, especially if any instance matches the affected version ranges listed in the NVD record or downstream vendor advisories.

Technical summary

NVD classifies the weakness as CWE-20 (improper input validation). The CVE description says a low-privileged attacker with network access via multiple protocols can compromise MySQL Server by causing a hang or repeatable crash. The record lists vulnerable Oracle MySQL ranges through 5.5.53, 5.6.34, and 5.7.16, and includes MariaDB and distro package mappings that downstream vendors addressed in their own advisories.

Defensive priority

Medium. The impact is availability-only, but the attack surface is network-reachable and the crash condition is described as repeatable.

Recommended defensive actions

  • Upgrade Oracle MySQL to a release newer than 5.5.53, 5.6.34, or 5.7.16, as applicable to your branch.
  • Apply the Oracle CPU January 2017 fix and any downstream vendor errata that reference this CVE.
  • Check whether any MariaDB or distribution package versions listed in the NVD record are in use, and move to a non-vulnerable build.
  • Restrict network exposure to MySQL services and minimize low-privilege account access where operationally feasible.
  • Monitor for repeated hangs, crash loops, or restart storms, and validate service recovery procedures.

Evidence notes

This debrief is based on the supplied NVD record, the CVE record link, and the referenced Oracle and downstream vendor advisories. The disclosure date used here is the CVE publish timestamp (2017-01-27T22:59:02.850Z); the later 2026-05-13 modification timestamp reflects record updates, not original disclosure.

Official resources

Originally published on 2017-01-27T22:59:02.850Z. The source record was later modified on 2026-05-13T00:24:29.033Z; that update does not change the original CVE disclosure date.