{"id":"CVE-2016-2047","details":"The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a \"/CN=\" string in a field in a certificate, as demonstrated by \"/OU=/CN=bar.com/CN=foo.com.\"","modified":"2026-04-11T04:02:04.184676Z","published":"2016-01-27T20:59:05.610Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2016:1279-1","SUSE-SU-2016:1619-1","SUSE-SU-2016:1620-1","openSUSE-SU-2024:10200-1","openSUSE-SU-2024:11038-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3453"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3557"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/81810"},{"type":"ADVISORY","url":"https://mariadb.atlassian.net/browse/MDEV-9212"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035606"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2953-1"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/01/26/3"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2954-1"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"89a264809d660fb5a4e7d43e9324b1f529a3a1d7"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"8efdfc8b58a84f8e8d62f0bb8b31f5b763664c06"}],"database_specific":{"versions":[{"introduced":"10.0.0"},{"fixed":"10.0.23"},{"introduced":"10.1.0"},{"fixed":"10.1.10"}]}},{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"863a73b80b83801a14b416006e64cf892837a657"},{"fixed":"40ae1b9b618fbbc3b494a896a9d074b74e414337"},{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"last_affected":"93a6142dd0c0c8b2e0683e4d57082582eac91fdb"},{"introduced":"0"},{"last_affected":"aed32a928b782859cccb545ad54f66a340356651"},{"introduced":"0"},{"last_affected":"67d52e7c7a1a23424e39273cbb6f5f9d56fda8d1"},{"introduced":"0"},{"last_affected":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"introduced":"0"},{"last_affected":"527c12ed611f3fe072c3043734319edb2c733099"}],"database_specific":{"versions":[{"introduced":"5.5.20"},{"fixed":"5.5.47"},{"introduced":"5.5.0"},{"last_affected":"5.5.48"},{"introduced":"5.6.0"},{"last_affected":"5.6.29"},{"introduced":"5.7.0"},{"last_affected":"5.7.11"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"9.0"}]}}],"versions":["mariadb-10.1.0","mariadb-10.1.2","mariadb-10.1.3","mariadb-10.1.4","mariadb-10.1.5","mariadb-10.1.6","mariadb-10.1.7","mariadb-10.1.8","mariadb-10.1.9","mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.5.15","mysql-5.5.19","mysql-5.5.23","mysql-5.5.25","mysql-5.5.27","mysql-5.5.44","mysql-5.5.47","mysql-5.5.48","mysql-5.6.29","mysql-5.7.11","mysql-8.0.0","mysql-9.0.0","mysql-9.0.0-release","mysql-cluster-9.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2047.json","vanir_signatures":[{"source":"https://github.com/mariadb/server/commit/89a264809d660fb5a4e7d43e9324b1f529a3a1d7","target":{"file":"sql/sql_reload.cc","function":"reload_acl_and_cache"},"signature_type":"Function","digest":{"function_hash":"111043706433505470027673465066186674885","length":5996},"id":"CVE-2016-2047-a5ddc231","signature_version":"v1","deprecated":false},{"source":"https://github.com/mariadb/server/commit/89a264809d660fb5a4e7d43e9324b1f529a3a1d7","target":{"file":"sql/sql_reload.cc"},"signature_type":"Line","digest":{"line_hashes":["159306742910402693391330092690036756588","154471466612685282770028951812159094962","48625389135732133100007130350636776985","293342893800983215307900708602667742465"],"threshold":0.9},"id":"CVE-2016-2047-ac002921","signature_version":"v1","deprecated":false}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7"}]},{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.10"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]}],"vanir_signatures_modified":"2026-04-11T04:02:04Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}