{"id":"CVE-2021-2007","details":"Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).","aliases":["BIT-mariadb-2021-2007","BIT-mariadb-min-2021-2007","BIT-mysql-client-2021-2007"],"modified":"2026-04-11T17:01:44.436227Z","published":"2021-01-20T15:15:45.720Z","related":["CGA-mj69-w4jc-r9x3"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202105-27"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210622-0001/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"cc37250a76472de4021bdfb395a17a9e736aecf6"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"403e6615fdd3f5f4de6d159457b2bd2fe566e0ad"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"d6886b95d0d48d80deffa7f2190b8abd5ee8236b"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"4b5a14d0fe3d6945a0a9516261f563dcfd1f2c9c"},{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"9a78a283f4ee7e8ccc4afb1d8a24c662fa4c634b"}],"database_specific":{"versions":[{"introduced":"5.5.0"},{"fixed":"5.5.65"},{"introduced":"10.1.0"},{"fixed":"10.1.41"},{"introduced":"10.2.0"},{"fixed":"10.2.26"},{"introduced":"10.3.0"},{"fixed":"10.3.17"},{"introduced":"10.4.0"},{"fixed":"10.4.7"}]}},{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"473109fb8c9de18d40960f87f8140c71a0d01dd6"},{"introduced":"0"},{"last_affected":"bd9c260cf7026a54d9bf91ce6782cdb4e6a25c71"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"ea7d2e2d16ac03afdd9cb72a972a95981107bf51"}],"database_specific":{"versions":[{"introduced":"5.6.0"},{"last_affected":"5.6.47"},{"introduced":"5.7.0"},{"last_affected":"5.7.29"},{"introduced":"8.0.0"},{"last_affected":"8.0.19"}]}}],"versions":["mariadb-10.1.0","mariadb-10.1.10","mariadb-10.1.11","mariadb-10.1.12","mariadb-10.1.13","mariadb-10.1.14","mariadb-10.1.15","mariadb-10.1.16","mariadb-10.1.17","mariadb-10.1.18","mariadb-10.1.19","mariadb-10.1.2","mariadb-10.1.20","mariadb-10.1.21","mariadb-10.1.22","mariadb-10.1.23","mariadb-10.1.24","mariadb-10.1.25","mariadb-10.1.26","mariadb-10.1.27","mariadb-10.1.28","mariadb-10.1.29","mariadb-10.1.3","mariadb-10.1.30","mariadb-10.1.31","mariadb-10.1.32","mariadb-10.1.33","mariadb-10.1.34","mariadb-10.1.35","mariadb-10.1.37","mariadb-10.1.38","mariadb-10.1.39","mariadb-10.1.4","mariadb-10.1.5","mariadb-10.1.6","mariadb-10.1.7","mariadb-10.1.8","mariadb-10.1.9","mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.10","mariadb-10.2.11","mariadb-10.2.12","mariadb-10.2.13","mariadb-10.2.14","mariadb-10.2.15","mariadb-10.2.16","mariadb-10.2.18","mariadb-10.2.19","mariadb-10.2.2","mariadb-10.2.20","mariadb-10.2.21","mariadb-10.2.22","mariadb-10.2.23","mariadb-10.2.24","mariadb-10.2.25","mariadb-10.2.5","mariadb-10.3.0","mariadb-10.3.1","mariadb-10.3.10","mariadb-10.3.12","mariadb-10.3.16","mariadb-10.3.2","mariadb-10.3.4","mariadb-10.3.5","mariadb-10.3.6","mariadb-10.3.7","mariadb-10.4.3","mariadb-10.4.4","mariadb-10.4.5","mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.6.40","mysql-5.6.45","mysql-5.6.47","mysql-5.7.29","mysql-8.0.19","mysql-cluster-8.0.19"],"database_specific":{"vanir_signatures":[{"digest":{"threshold":0.9,"line_hashes":["10029655468523680087909754560677550487","249206229017255372790869811829915538710","135594948238048789926237750215822573110","294639499642123912567807309333166069529"]},"source":"https://github.com/mariadb/server/commit/cc37250a76472de4021bdfb395a17a9e736aecf6","id":"CVE-2021-2007-b48fe36d","signature_type":"Line","signature_version":"v1","target":{"file":"sql-common/client_plugin.c"},"deprecated":false},{"digest":{"length":1863,"function_hash":"328702508623507382370033351725735174012"},"source":"https://github.com/mariadb/server/commit/cc37250a76472de4021bdfb395a17a9e736aecf6","id":"CVE-2021-2007-e9448928","signature_type":"Function","signature_version":"v1","target":{"file":"sql-common/client_plugin.c","function":"mysql_load_plugin_v"},"deprecated":false}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-2007.json","vanir_signatures_modified":"2026-04-11T17:01:44Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}