CVE-2015-1027

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-1027
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2015-1027.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2015-1027
Related
Published
2017-09-29T01:34:47Z
Modified
2025-04-20T01:37:25Z
Downstream
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The version checking subroutine in percona-toolkit before 2.2.13 and xtrabackup before 2.2.9 was vulnerable to silent HTTP downgrade attacks and Man In The Middle attacks in which the server response could be modified to allow the attacker to respond with modified command payload and have the client return additional running configuration information leading to an information disclosure of running configuration of MySQL.

References

Affected packages

Debian:11 / percona-toolkit

Package

Name
percona-toolkit
Purl
pkg:deb/debian/percona-toolkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.13-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / percona-toolkit

Package

Name
percona-toolkit
Purl
pkg:deb/debian/percona-toolkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.13-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / percona-toolkit

Package

Name
percona-toolkit
Purl
pkg:deb/debian/percona-toolkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.13-1

Ecosystem specific

{
    "urgency": "unimportant"
}