{"id":"CVE-2020-2812","details":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","aliases":["BIT-mariadb-2020-2812","BIT-mariadb-min-2020-2812","BIT-mysql-client-2020-2812"],"modified":"2026-04-10T04:26:15.885044Z","published":"2020-04-15T14:15:28.843Z","related":["ALSA-2020:3732","ALSA-2020:5500","CGA-xqvq-cwc8-56xh","MGASA-2020-0284","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2020:1625-1","SUSE-SU-2020:1710-1","SUSE-SU-2020:1711-1","SUSE-SU-2020:1798-1","SUSE-SU-2020:3625-1","openSUSE-SU-2020:0870-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200416-0003/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202012-08"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4350-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202105-27"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"0"},{"last_affected":"776555af021e917ce0d6235386b43ae59fdd5161"},{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"f20c63264ab4170fc8e45093042bd2e7272ce9fc"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"530da97c65a8018ef049dfb990df6b98bc5e4ccd"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"985f63cce1057d7b3fd6e86e65a2a2ee7d970073"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"607467bd63db2c6ca64610eb9f4e703711f4dfc6"},{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"1b18cddaa23711776537ee98f16529a74ff861c2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"10.0"},{"introduced":"5.5.0"},{"fixed":"5.5.68"},{"introduced":"10.1.0"},{"fixed":"10.1.45"},{"introduced":"10.2.0"},{"fixed":"10.2.32"},{"introduced":"10.3.0"},{"fixed":"10.3.23"},{"introduced":"10.4.0"},{"fixed":"10.4.13"}]}},{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"473109fb8c9de18d40960f87f8140c71a0d01dd6"},{"introduced":"0"},{"last_affected":"bd9c260cf7026a54d9bf91ce6782cdb4e6a25c71"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"ea7d2e2d16ac03afdd9cb72a972a95981107bf51"},{"introduced":"0"},{"last_affected":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"introduced":"0"},{"last_affected":"527c12ed611f3fe072c3043734319edb2c733099"}],"database_specific":{"versions":[{"introduced":"5.6.0"},{"last_affected":"5.6.47"},{"introduced":"5.7.0"},{"last_affected":"5.7.29"},{"introduced":"8.0.0"},{"last_affected":"8.0.19"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"9.0"}]}}],"versions":["clone-5.1.0-build","clone-5.1.31-pv-0.2.0-build","clone-5.1.4-build","clone-5.4.0-build","clone-5.4.3-build","clone-5.5.5-m3-build","clone-5.5.6-m3-build","mariadb-10.0.0","mariadb-10.1.0","mariadb-10.1.10","mariadb-10.1.11","mariadb-10.1.12","mariadb-10.1.13","mariadb-10.1.14","mariadb-10.1.15","mariadb-10.1.16","mariadb-10.1.17","mariadb-10.1.18","mariadb-10.1.19","mariadb-10.1.2","mariadb-10.1.20","mariadb-10.1.21","mariadb-10.1.22","mariadb-10.1.23","mariadb-10.1.24","mariadb-10.1.25","mariadb-10.1.26","mariadb-10.1.27","mariadb-10.1.28","mariadb-10.1.29","mariadb-10.1.3","mariadb-10.1.30","mariadb-10.1.31","mariadb-10.1.32","mariadb-10.1.33","mariadb-10.1.34","mariadb-10.1.35","mariadb-10.1.37","mariadb-10.1.38","mariadb-10.1.39","mariadb-10.1.4","mariadb-10.1.41","mariadb-10.1.42","mariadb-10.1.43","mariadb-10.1.5","mariadb-10.1.6","mariadb-10.1.7","mariadb-10.1.8","mariadb-10.1.9","mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.10","mariadb-10.2.11","mariadb-10.2.12","mariadb-10.2.13","mariadb-10.2.14","mariadb-10.2.15","mariadb-10.2.16","mariadb-10.2.18","mariadb-10.2.19","mariadb-10.2.2","mariadb-10.2.20","mariadb-10.2.21","mariadb-10.2.22","mariadb-10.2.23","mariadb-10.2.24","mariadb-10.2.25","mariadb-10.2.26","mariadb-10.2.27","mariadb-10.2.28","mariadb-10.2.29","mariadb-10.2.30","mariadb-10.2.31","mariadb-10.2.5","mariadb-10.3.0","mariadb-10.3.1","mariadb-10.3.10","mariadb-10.3.12","mariadb-10.3.16","mariadb-10.3.17","mariadb-10.3.18","mariadb-10.3.19","mariadb-10.3.2","mariadb-10.3.20","mariadb-10.3.21","mariadb-10.3.4","mariadb-10.3.5","mariadb-10.3.6","mariadb-10.3.7","mariadb-10.4.10","mariadb-10.4.11","mariadb-10.4.3","mariadb-10.4.4","mariadb-10.4.5","mariadb-10.4.7","mariadb-10.4.9","mariadb-5.5.20-alpha","mariadb-5.5.23","mariadb-5.5.37","mariadb-5.5.38","mariadb-5.5.39","mariadb-5.5.40","mariadb-5.5.41","mariadb-5.5.42","mariadb-5.5.43","mariadb-5.5.44","mariadb-5.5.45","mariadb-5.5.46","mariadb-5.5.47","mariadb-5.5.48","mariadb-5.5.49","mariadb-5.5.50","mariadb-5.5.51","mariadb-5.5.52","mariadb-5.5.53","mariadb-5.5.54","mariadb-5.5.55","mariadb-5.5.56","mariadb-5.5.57","mariadb-5.5.58","mariadb-5.5.59","mariadb-5.5.60","mariadb-5.5.61","mariadb-5.5.62","mariadb-5.5.63","mariadb-5.5.64","mariadb-5.5.65","mariadb-5.5.66","mariadb-5.5.67","mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.6.40","mysql-5.6.45","mysql-5.6.47","mysql-5.7.29","mysql-8.0.0","mysql-8.0.19","mysql-9.0.0","mysql-9.0.0-release","mysql-cluster-8.0.19","mysql-cluster-9.0.0","mysql_4.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-2812.json","unresolved_ranges":[{"events":[{"introduced":"7.3"}]},{"events":[{"introduced":"9.5"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}