{"id":"CVE-2017-3653","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).","modified":"2026-04-16T06:15:59.121366328Z","published":"2017-08-08T15:29:08.757Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2017:2290-1","SUSE-SU-2017:2921-1","SUSE-SU-2018:0079-1","SUSE-SU-2018:1853-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3944"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/99810"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2729"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3955"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3922"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1038928"},{"type":"FIX","url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"type":"FIX","url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"type":"FIX","url":"https://access.redhat.com/errata/RHSA-2018:2439"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"FIX","url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"type":"FIX","url":"https://access.redhat.com/errata/RHSA-2018:0574"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"0a479f786020d3c1431a25523661759748404770"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"535910ae5f20e36405631030e9c0eb22fe40a7c4"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"c548fb0667ffe71d9387eaec342b1716fc4c9526"}],"database_specific":{"versions":[{"introduced":"10.0.0"},{"fixed":"10.0.32"},{"introduced":"10.1.0"},{"fixed":"10.1.26"},{"introduced":"10.2.0"},{"fixed":"10.2.8"}]}},{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"last_affected":"ad88f2a7b5c5827cb1ba78eee3497fb851b37a9f"},{"introduced":"0"},{"last_affected":"3a4e7bc7c416888fda897239c03549c2929bb64c"},{"introduced":"0"},{"last_affected":"4826e159b432c961290cdbe651da0cfe3d7b2539"},{"introduced":"0"},{"last_affected":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"introduced":"0"},{"last_affected":"527c12ed611f3fe072c3043734319edb2c733099"},{"introduced":"0"},{"last_affected":"ae41ce7c4ecff5e1e336ab768867370b8c94e02d"},{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"fixed":"34cd74e52185de2ea3156e8295de3c638cde8c88"}],"database_specific":{"versions":[{"introduced":"5.5.0"},{"last_affected":"5.5.56"},{"introduced":"5.6.0"},{"last_affected":"5.6.36"},{"introduced":"5.7.0"},{"last_affected":"5.7.18"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"9.0"},{"introduced":"0"},{"last_affected":"7.5"},{"introduced":"5.5.0"},{"fixed":"5.5.57"}]}}],"versions":["mariadb-10.1.0","mariadb-10.1.10","mariadb-10.1.11","mariadb-10.1.12","mariadb-10.1.13","mariadb-10.1.14","mariadb-10.1.15","mariadb-10.1.16","mariadb-10.1.17","mariadb-10.1.18","mariadb-10.1.19","mariadb-10.1.2","mariadb-10.1.20","mariadb-10.1.21","mariadb-10.1.22","mariadb-10.1.23","mariadb-10.1.24","mariadb-10.1.25","mariadb-10.1.3","mariadb-10.1.4","mariadb-10.1.5","mariadb-10.1.6","mariadb-10.1.7","mariadb-10.1.8","mariadb-10.1.9","mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.2","mariadb-10.2.5","mariadb-10.2.6","mariadb-10.2.7","mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.5.15","mysql-5.5.19","mysql-5.5.23","mysql-5.5.25","mysql-5.5.27","mysql-5.5.44","mysql-5.5.47","mysql-5.5.49","mysql-5.5.55","mysql-5.5.56","mysql-5.6.36","mysql-5.7.18","mysql-8.0.0","mysql-9.0.0","mysql-9.0.0-release","mysql-cluster-7.5.0","mysql-cluster-9.0.0"],"database_specific":{"vanir_signatures":[{"signature_version":"v1","source":"https://github.com/mariadb/server/commit/c548fb0667ffe71d9387eaec342b1716fc4c9526","signature_type":"Function","target":{"function":"mysql_derived_merge_for_insert","file":"sql/sql_derived.cc"},"digest":{"length":1304,"function_hash":"248046718813765606309068251123658866222"},"deprecated":false,"id":"CVE-2017-3653-2311d166"},{"signature_version":"v1","id":"CVE-2017-3653-8ba756c4","signature_type":"Line","target":{"file":"sql/sql_derived.cc"},"digest":{"threshold":0.9,"line_hashes":["37598745779533050802933831451354240563","148100691799475688462979637583791371574","256714664058405617444146650046350315869","30840251350323357694068166601770960776","122022733530817239314150393063036047891","318300470379782107237051717217085670592","96276598501522749142741981776648661971","74754980952004710391973414329717813170","216173259946383661325751397329790466678"]},"deprecated":false,"source":"https://github.com/mariadb/server/commit/c548fb0667ffe71d9387eaec342b1716fc4c9526"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"vanir_signatures_modified":"2026-04-11T04:14:32Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-3653.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}