CVE-2016-2047

Source
https://cve.org/CVERecord?id=CVE-2016-2047
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2047.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-2047
Downstream
Related
Published
2016-01-27T20:59:05.610Z
Modified
2026-02-06T22:22:22.541946Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

The sslverifyserver_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."

References

Affected packages

Git / github.com/mariadb/server

Affected versions

mariadb-10.*
mariadb-10.1.0
mysql-5.*
mysql-5.5.42
mysql-5.5.43
mysql-5.5.44
mysql-5.5.45
mysql-5.5.46

Database specific

vanir_signatures
[
    {
        "deprecated": false,
        "source": "https://github.com/mariadb/server/commit/89a264809d660fb5a4e7d43e9324b1f529a3a1d7",
        "id": "CVE-2016-2047-a5ddc231",
        "target": {
            "file": "sql/sql_reload.cc",
            "function": "reload_acl_and_cache"
        },
        "digest": {
            "function_hash": "111043706433505470027673465066186674885",
            "length": 5996.0
        },
        "signature_type": "Function",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "source": "https://github.com/mariadb/server/commit/89a264809d660fb5a4e7d43e9324b1f529a3a1d7",
        "id": "CVE-2016-2047-ac002921",
        "target": {
            "file": "sql/sql_reload.cc"
        },
        "digest": {
            "line_hashes": [
                "159306742910402693391330092690036756588",
                "154471466612685282770028951812159094962",
                "48625389135732133100007130350636776985",
                "293342893800983215307900708602667742465"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "signature_version": "v1"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2047.json"

Git / github.com/mysql/mysql-server

Affected ranges

Type
GIT
Repo
https://github.com/mysql/mysql-server
Events

Affected versions

mysql-5.*
mysql-5.0.96
mysql-5.1.61
mysql-5.1.62
mysql-5.1.63
mysql-5.1.65
mysql-5.1.66
mysql-5.1.67
mysql-5.1.68
mysql-5.1.69
mysql-5.1.69-retag
mysql-5.1.70
mysql-5.1.71
mysql-5.1.72
mysql-5.1.73
mysql-5.1.74
mysql-5.1.75
mysql-5.1.76
mysql-5.1.77
mysql-5.5.20
mysql-5.5.21
mysql-5.5.22
mysql-5.5.23
mysql-5.5.24
mysql-5.5.25
mysql-5.5.25a
mysql-5.5.27
mysql-5.5.28
mysql-5.5.29
mysql-5.5.30
mysql-5.5.31
mysql-5.5.32
mysql-5.5.33
mysql-5.5.34
mysql-5.5.35
mysql-5.5.36
mysql-5.5.37
mysql-5.5.38
mysql-5.5.39
mysql-5.5.40
mysql-5.5.41
mysql-5.5.42
mysql-5.5.43
mysql-5.5.44
mysql-5.5.45
mysql-5.5.46

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2047.json"