Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.

Project Subscriptions

Vendors Products
Mariadb Subscribe
Mariadb Subscribe
Percona Subscribe
Percona Server Subscribe
Xtradb Cluster Subscribe
Enterprise Linux Subscribe
Rhel Software Collections Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-3711-1 mariadb-10.0 security update
EUVD EUVD EUVD-2016-7566 Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://rhn.redhat.com/errata/RHSA-2016-2130.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2131.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2595.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2749.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2927.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2928.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2017-0184.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2016/Nov/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2016/10/25/4 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html cve-icon cve-icon
http://www.securityfocus.com/bid/92911 cve-icon cve-icon
http://www.securityfocus.com/bid/93614 cve-icon cve-icon
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html cve-icon cve-icon
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html cve-icon cve-icon
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html cve-icon cve-icon
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html cve-icon cve-icon
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805 cve-icon cve-icon
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291 cve-icon cve-icon
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html cve-icon cve-icon
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt cve-icon
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ cve-icon cve-icon
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ cve-icon cve-icon
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2016-6663 cve-icon
https://www.cve.org/CVERecord?id=CVE-2016-6663 cve-icon
https://www.exploit-db.com/exploits/40678/ cve-icon cve-icon
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T01:36:29.485Z

Reserved: 2016-08-10T00:00:00.000Z

Link: CVE-2016-6663

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-12-13T21:59:00.160

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-6663

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-09-12T00:00:00Z

Links: CVE-2016-6663 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses