{"id":"CVE-2020-2574","details":"Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).","aliases":["BIT-mariadb-2020-2574","BIT-mariadb-min-2020-2574","BIT-mysql-client-2020-2574"],"modified":"2026-04-16T04:40:25.313436824Z","published":"2020-01-15T17:15:18.583Z","related":["ALSA-2020:3732","ALSA-2020:5500","ALSA-2020:5503","CGA-3qgh-5j7h-ccgx","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2020:0496-1","SUSE-SU-2020:0505-1","SUSE-SU-2020:0523-1","SUSE-SU-2020:0527-1","SUSE-SU-2020:0640-1","SUSE-SU-2020:0831-1","openSUSE-SU-2020:0289-1","openSUSE-SU-2024:11038-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/09/29/1"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202105-27"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200122-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4250-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4250-2/"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"4d1c1b23e1373bbd4e72f524e855f1db076d2c73"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"84d4005bad1abc45c5baac581ae26a563dea14bb"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"0a891ad6a6ba698484ba71171c3aa793705b8c6a"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"0152704ae3f857668dbc05803950adcf131b8685"},{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"ba6bfc402c352372cc1a9ec20b5dc50b2204549f"}],"database_specific":{"versions":[{"introduced":"5.5.0"},{"fixed":"5.5.67"},{"introduced":"10.1.0"},{"fixed":"10.1.44"},{"introduced":"10.2.0"},{"fixed":"10.2.31"},{"introduced":"10.3.0"},{"fixed":"10.3.22"},{"introduced":"10.4.0"},{"fixed":"10.4.12"}]}},{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"9c3a49ec84b521cb0b35383f119099b2eb25d4ff"},{"introduced":"0"},{"last_affected":"b2f3214ae2b4a250d3b8a7b7a61037f89b5dc9b1"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"91a17cedb1ee880fe7915fb14cfd74c04e8d6588"}],"database_specific":{"versions":[{"introduced":"5.6.0"},{"last_affected":"5.6.46"},{"introduced":"5.7.0"},{"last_affected":"5.7.28"},{"introduced":"8.0.0"},{"last_affected":"8.0.18"}]}}],"versions":["mariadb-10.1.0","mariadb-10.1.10","mariadb-10.1.11","mariadb-10.1.12","mariadb-10.1.13","mariadb-10.1.14","mariadb-10.1.15","mariadb-10.1.16","mariadb-10.1.17","mariadb-10.1.18","mariadb-10.1.19","mariadb-10.1.2","mariadb-10.1.20","mariadb-10.1.21","mariadb-10.1.22","mariadb-10.1.23","mariadb-10.1.24","mariadb-10.1.25","mariadb-10.1.26","mariadb-10.1.27","mariadb-10.1.28","mariadb-10.1.29","mariadb-10.1.3","mariadb-10.1.30","mariadb-10.1.31","mariadb-10.1.32","mariadb-10.1.33","mariadb-10.1.34","mariadb-10.1.35","mariadb-10.1.37","mariadb-10.1.38","mariadb-10.1.39","mariadb-10.1.4","mariadb-10.1.41","mariadb-10.1.42","mariadb-10.1.43","mariadb-10.1.5","mariadb-10.1.6","mariadb-10.1.7","mariadb-10.1.8","mariadb-10.1.9","mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.10","mariadb-10.2.11","mariadb-10.2.12","mariadb-10.2.13","mariadb-10.2.14","mariadb-10.2.15","mariadb-10.2.16","mariadb-10.2.18","mariadb-10.2.19","mariadb-10.2.2","mariadb-10.2.20","mariadb-10.2.21","mariadb-10.2.22","mariadb-10.2.23","mariadb-10.2.24","mariadb-10.2.25","mariadb-10.2.26","mariadb-10.2.27","mariadb-10.2.28","mariadb-10.2.29","mariadb-10.2.30","mariadb-10.2.5","mariadb-10.3.0","mariadb-10.3.1","mariadb-10.3.10","mariadb-10.3.12","mariadb-10.3.16","mariadb-10.3.17","mariadb-10.3.18","mariadb-10.3.19","mariadb-10.3.2","mariadb-10.3.20","mariadb-10.3.21","mariadb-10.3.4","mariadb-10.3.5","mariadb-10.3.6","mariadb-10.3.7","mariadb-10.4.10","mariadb-10.4.11","mariadb-10.4.3","mariadb-10.4.4","mariadb-10.4.5","mariadb-10.4.7","mariadb-10.4.9","mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.6.40","mysql-5.6.45","mysql-5.6.46","mysql-5.7.28","mysql-8.0.18","mysql-cluster-8.0.18"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-2574.json","vanir_signatures":[{"signature_version":"v1","id":"CVE-2020-2574-247b795c","source":"https://github.com/mariadb/server/commit/4d1c1b23e1373bbd4e72f524e855f1db076d2c73","target":{"file":"sql-common/client.c"},"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["252433806933085366420702721037503420292","261544691523631321679142379015874160011","7699705637444748925595608774843986708","115470899182411156247643435634697836284"]},"deprecated":false},{"signature_version":"v1","source":"https://github.com/mariadb/server/commit/4d1c1b23e1373bbd4e72f524e855f1db076d2c73","id":"CVE-2020-2574-5f1af619","target":{"function":"send_server_handshake_packet","file":"sql/sql_acl.cc"},"signature_type":"Function","digest":{"length":2164,"function_hash":"262053342286479299849123738816776712772"},"deprecated":false},{"id":"CVE-2020-2574-8dedec31","signature_version":"v1","source":"https://github.com/mariadb/server/commit/4d1c1b23e1373bbd4e72f524e855f1db076d2c73","target":{"function":"CLI_MYSQL_REAL_CONNECT","file":"sql-common/client.c"},"signature_type":"Function","digest":{"length":13090,"function_hash":"70481074292795631243999841673834314101"},"deprecated":false},{"id":"CVE-2020-2574-a4b6dbc3","signature_version":"v1","source":"https://github.com/mariadb/server/commit/4d1c1b23e1373bbd4e72f524e855f1db076d2c73","target":{"file":"sql/sql_acl.cc"},"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["99489612520137149134503524235614005584","231833035654469486984772267667153937447","64006901634916951289469580350286748865","162251870262657824737368113910973120880"]},"deprecated":false}],"vanir_signatures_modified":"2026-04-11T11:23:25Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}