PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-3318 Redhat CVE debrief

CVE-2017-3318 is a MySQL Server error-handling vulnerability that can expose sensitive data from affected server instances. The NVD record describes the flaw as difficult to exploit and notes that an attacker needs high privileges, local logon to the infrastructure where MySQL runs, and user interaction by another person. The primary impact is confidentiality: successful exploitation can lead to unauthorized access to critical data or all data accessible to MySQL Server.

Vendor
Redhat
Product
CVE-2017-3318
CVSS
MEDIUM 4
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-27
Original CVE updated
2026-05-13
Advisory published
2017-01-27
Advisory updated
2026-05-13

Who should care

Database administrators, platform and infrastructure teams, and downstream package maintainers running affected Oracle MySQL releases or vendor-packaged builds on supported Linux distributions. It is most relevant in environments where privileged local users or administrators can interact with the host running MySQL.

Technical summary

The vulnerability is classified by NVD with CVSS 3.1 vector CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N, indicating a local, high-complexity issue requiring high privileges and user interaction. Oracle's affected ranges in the record are MySQL 5.5.53 and earlier, 5.6.34 and earlier, and 5.7.16 and earlier. NVD associates the issue with error handling in the MySQL Server component and lists downstream advisories for Debian, Red Hat, and Gentoo, alongside Oracle's January 2017 CPU advisory.

Defensive priority

Medium priority for systems still running affected MySQL versions or unpatched downstream builds; lower urgency if already updated to fixed releases and host-level access is tightly controlled.

Recommended defensive actions

  • Verify whether any MySQL Server deployments are at or below the affected version ranges listed by NVD: 5.5.53, 5.6.34, and 5.7.16.
  • Apply vendor-recommended updates from Oracle or your downstream distribution advisories for affected packages.
  • Review which users have privileged local access to the systems that run MySQL Server, since the reported attack path requires high privileges on the host.
  • Limit interactive access to database hosts and reduce the number of accounts with administrative privileges where feasible.
  • Use the NVD and vendor advisories to confirm whether your exact package build is covered, especially for downstream Red Hat, Debian, or Gentoo packages.

Evidence notes

Based on the NVD record, this issue affects Oracle MySQL Server and is described as an error-handling vulnerability with confidentiality impact only. The NVD description states that exploitation requires a high-privileged attacker with logon to the infrastructure where MySQL Server executes and human interaction from someone other than the attacker. NVD lists affected Oracle MySQL versions 5.5.53 and earlier, 5.6.34 and earlier, and 5.7.16 and earlier. The reference set includes Oracle's January 2017 CPU advisory and downstream advisories from Debian, Red Hat, and Gentoo, supporting the need to check vendor-specific fixes rather than relying only on the generic CVE entry.

Official resources

CVE published on 2017-01-27. The source record was last modified by NVD on 2026-05-13. This entry is not marked as a CISA KEV item in the supplied corpus.