4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.006 Low
EPSS
Percentile
78.6%
The version of Oracle MySQL Workbench installed on the remote Windows host is prior to 8.0.28. It is, therefore, affected by a vulnerability in the MySQL Workbench product of Oracle MySQL (component: Workbench: libssh). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via MySQL Workbench to compromise MySQL Workbench. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Workbench.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(156885);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/06");
script_cve_id("CVE-2021-3634");
script_xref(name:"IAVA", value:"2022-A-0041-S");
script_name(english:"Oracle MySQL Workbench < 8.0.28 (Jan 2022)");
script_set_attribute(attribute:"synopsis", value:
"An application installed on the remote Windows host is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"The version of Oracle MySQL Workbench installed on the remote Windows host is prior to 8.0.28. It is, therefore,
affected by a vulnerability in the MySQL Workbench product of Oracle MySQL (component: Workbench: libssh). Supported
versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with
network access via MySQL Workbench to compromise MySQL Workbench. Successful attacks of this vulnerability can result
in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Workbench.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL");
script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/a/tech/docs/cpujan2022cvrf.xml");
script_set_attribute(attribute:"solution", value:
"Upgrade to Oracle MySQL Workbench version 8.0.28 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-3634");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/01/18");
script_set_attribute(attribute:"patch_publication_date", value:"2022/01/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/01/20");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:mysql_workbench");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mysql:mysql_workbench");
script_set_attribute(attribute:"stig_severity", value:"II");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mysql_workbench_win_installed.nbin");
script_require_keys("installed_sw/MySQL Workbench");
exit(0);
}
include('vcf.inc');
var app_info = vcf::get_app_info(app:'MySQL Workbench');
var constraints = [{'fixed_version': '8.0.28'}];
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_WARNING
);
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | mysql_workbench | cpe:/a:oracle:mysql_workbench | |
mysql | mysql_workbench | cpe:/a:mysql:mysql_workbench |
4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.006 Low
EPSS
Percentile
78.6%