Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "C851FA0E-357E-4B9E-A441-9C74B3526B37", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "B12FA18C-AB93-4522-AA2C-303342452E59", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "6FD31981-E3ED-41D0-92EB-ABA7490D60E5", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "2E918FF1-8B40-4DC3-9269-1D3BFD18C58D", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "86D9BEC1-F4C2-4BE6-A608-D8958A032972", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "77F04B12-6063-4BAB-A69B-F1F19CC3FFB8", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "8A77E458-3AE9-4B02-9A9F-A640DAE073B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "DF78DF61-E6C3-4E92-A8B9-843698D03D18", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "56F2A57F-2CDD-48F8-AC92-1E599875E704", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "4F2BAD43-DDF2-4830-A844-8A6F18EF98CC", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "FCB1ECEF-8420-41CF-9CFD-AD551BB04C9F", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "B4C45914-1CB3-440F-AB7B-564B3A09D9BB", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "581E047E-339B-4CB4-ADA9-AF25BE0345B8", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "C16A0D77-DA95-41D7-9BE2-7B306AF9FF6B", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "B4BAE0F1-010D-47D8-B65E-335EF455C951", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "552E49DC-80FD-4422-9341-44CE0C127027", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDEAEFC9-9C50-44F9-8D8C-FAC18F706DAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "92BD73CE-88F8-4DF0-8293-FBE1FEC8BAB2", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0B438CEA-C321-4B48-8610-9E0CABA7F9B0", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "56C584AF-64B0-4DCB-9E36-E60170654D03", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6DD15542-FBFB-4513-BC42-5EE63247313D", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "98247C01-F906-426A-B5C6-5A3905B83027", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "5F7C92F3-D18F-47B8-A6D7-2DD210B0BC77", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "323BDFDE-FA24-4169-8BD4-C7978C4FDBBA", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0FA479ED-0B6B-464A-B476-82C5C4E05D20", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "2EFF6DF6-DE51-49EA-B745-4EBC20814E6A", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "A8B00856-5DDC-415A-98AC-62736B9C2DA9", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mariadb:mariadb:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0122E5B-7EBF-431A-B144-45F945099FE6", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "59BC8D7B-866E-42E5-9EF9-E8F487AE21C6", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A1982C3-4F1B-4B62-AB75-0FE88EA1BC33", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "49A3AD71-6E48-40CF-BA9D-75B6D8D02B9A", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBE6FE-12C8-4E5E-990E-9E4859862A80", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "ACBBA64F-F39C-422A-9FDB-72372B6C4320", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "43121525-06CD-4C4A-A4C0-5AC26CDB275F", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mariadb:mariadb:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "F99E43D2-D49C-4990-B683-2E26D58DB816", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "C082352C-DFE1-461A-9803-C180021144A6", "vulnerable": true}, {"criteria": "cpe:2.3:a:mariadb:mariadb:5.5.22:*:*:*:*:*:*:*", "matchCriteriaId": "F49B9C56-71B4-4B1B-ABD8-CFE56A4F0816", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value."}, {"lang": "es", "value": "sql/password.c en Oracle MySQL 5.1.x anterior a 5.1.63, 5.5.x anterior a 5.5.24, y 5.6.x anterior a 5.6.6, y MariaDB 5.1.x anterior a 5.1.62, 5.2.x anterior a 5.2.12, 5.3.x anterior a 5.3.6, y 5.5.x anterior a 5.5.23, cuando se ejecuta en determinados entornos con determinadas implementaciones de la funci\u00f3n memcmp, permite que atacantes remotos eviten la autenticaci\u00f3n utilizando repetidamente la misma contrase\u00f1a incorrecta, lo que eventualmente provoca una comparaci\u00f3n de token con resultado de \u00e9xito en una variable de retorno no validada"}], "id": "CVE-2012-2122", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-06-26T18:55:05.083", "references": [{"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://bugs.mysql.com/bug.php?id=64884"}, {"source": "secalert@redhat.com", "url": "http://kb.askmonty.org/en/mariadb-5162-release-notes/"}, {"source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"}, {"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://seclists.org/oss-sec/2012/q2/493"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/49417"}, {"source": "secalert@redhat.com", "url": "http://secunia.com/advisories/53372"}, {"source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"}, {"source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1027143"}, {"source": "secalert@redhat.com", "url": "http://www.exploit-db.com/exploits/19092"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/53911"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "https://community.rapid7.com/community/metasploit/blog/2012/06/11/cve-2012-2122-a-tragically-comedic-security-flaw-in-mysql"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://bugs.mysql.com/bug.php?id=64884"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.askmonty.org/en/mariadb-5162-release-notes/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://seclists.org/oss-sec/2012/q2/493"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/49417"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1027143"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/19092"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/53911"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "https://community.rapid7.com/community/metasploit/blog/2012/06/11/cve-2012-2122-a-tragically-comedic-security-flaw-in-mysql"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-287"}], "source": "nvd@nist.gov", "type": "Primary"}]}