PatchSiren cyber security CVE debrief
CVE-2017-3265 Redhat CVE debrief
CVE-2017-3265 is a MySQL Server component vulnerability in the Packaging subcomponent that can let a highly privileged local attacker with logon access to the host compromise MySQL Server. NVD says successful exploitation may expose critical data or all MySQL-accessible data and can also cause a hang or repeatable crash, with human interaction required.
- Vendor
- Redhat
- Product
- CVE-2017-3265
- CVSS
- MEDIUM 5.6
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-27
- Advisory updated
- 2026-05-13
Who should care
Database administrators and infrastructure teams running Oracle MySQL 5.5.53/5.6.34/5.7.16 or earlier, plus operators of affected downstream packages listed by NVD for Red Hat, Debian, and MariaDB.
Technical summary
NVD classifies the issue as a local attack requiring high privileges and user interaction (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H). The affected component is MySQL Server: Packaging. The reported impact is confidentiality and availability loss: unauthorized access to critical data or complete MySQL-accessible data, and the ability to hang or repeatedly crash the server.
Defensive priority
Medium. Prioritize remediation if the affected MySQL versions are deployed on shared hosts or anywhere privileged local access is available, because exploitation still requires significant attacker access but can lead to serious data exposure or denial of service.
Recommended defensive actions
- Confirm whether any Oracle MySQL installation is at or below 5.5.53, 5.6.34, or 5.7.16, and inventory any downstream Red Hat, Debian, or MariaDB packages mapped in NVD.
- Apply the Oracle CPU January 2017 update or the corresponding vendor/distro errata for your platform.
- Restrict and audit local administrative access to database hosts, because the vulnerability requires a highly privileged login on the infrastructure where MySQL executes.
- Review monitoring and alerting for MySQL crashes, hangs, and unexpected restarts on affected systems.
- Track downstream advisory guidance from your Linux distribution or database vendor before and after upgrading to confirm the issue is fully remediated.
Evidence notes
This debrief is based on the CVE record and NVD metadata supplied in the corpus. The description states the vulnerability affects Oracle MySQL Server component packaging and that exploitation requires a high-privilege attacker with local logon plus human interaction. NVD lists affected Oracle MySQL version ranges (5.5.53 and earlier, 5.6.34 and earlier, 5.7.16 and earlier) and also maps related downstream package CPEs for Red Hat Enterprise Linux, Debian 8.0, and MariaDB. The provided CVSS vector is CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H.
Official resources
-
CVE-2017-3265 CVE record
CVE.org
-
CVE-2017-3265 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Broken Link, Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
CVE published in the provided corpus on 2017-01-27T22:59:03.087Z. NVD metadata was last modified on 2026-05-13T00:24:29.033Z. No CISA KEV entry is present in the supplied data.