PatchSiren cyber security CVE debrief
CVE-2017-3258 Redhat CVE debrief
CVE-2017-3258 is a MySQL Server DDL weakness that can let a low-privileged network attacker trigger a hang or frequently repeatable crash, resulting in denial of service. Oracle’s advisory and the NVD record place affected Oracle MySQL releases at 5.5.53 and earlier, 5.6.34 and earlier, and 5.7.16 and earlier. NVD also maps downstream MariaDB and Linux distribution package entries for the same CVE. The published CVSS v3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H.
- Vendor
- Redhat
- Product
- CVE-2017-3258
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-27
- Advisory updated
- 2026-05-13
Who should care
Database administrators, platform teams, and Linux package maintainers running exposed MySQL or MariaDB services, especially if any instance matches the affected version ranges listed in the NVD record or downstream vendor advisories.
Technical summary
NVD classifies the weakness as CWE-20 (improper input validation). The CVE description says a low-privileged attacker with network access via multiple protocols can compromise MySQL Server by causing a hang or repeatable crash. The record lists vulnerable Oracle MySQL ranges through 5.5.53, 5.6.34, and 5.7.16, and includes MariaDB and distro package mappings that downstream vendors addressed in their own advisories.
Defensive priority
Medium. The impact is availability-only, but the attack surface is network-reachable and the crash condition is described as repeatable.
Recommended defensive actions
- Upgrade Oracle MySQL to a release newer than 5.5.53, 5.6.34, or 5.7.16, as applicable to your branch.
- Apply the Oracle CPU January 2017 fix and any downstream vendor errata that reference this CVE.
- Check whether any MariaDB or distribution package versions listed in the NVD record are in use, and move to a non-vulnerable build.
- Restrict network exposure to MySQL services and minimize low-privilege account access where operationally feasible.
- Monitor for repeated hangs, crash loops, or restart storms, and validate service recovery procedures.
Evidence notes
This debrief is based on the supplied NVD record, the CVE record link, and the referenced Oracle and downstream vendor advisories. The disclosure date used here is the CVE publish timestamp (2017-01-27T22:59:02.850Z); the later 2026-05-13 modification timestamp reflects record updates, not original disclosure.
Official resources
-
CVE-2017-3258 CVE record
CVE.org
-
CVE-2017-3258 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Broken Link, Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Originally published on 2017-01-27T22:59:02.850Z. The source record was later modified on 2026-05-13T00:24:29.033Z; that update does not change the original CVE disclosure date.