{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2019-2692","title":"Title"},{"category":"description","text":"Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2019-2692","url":"https://www.suse.com/security/cve/CVE-2019-2692"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"title":"SUSE CVE CVE-2019-2692","tracking":{"current_release_date":"2025-07-01T02:00:07Z","generator":{"date":"2023-02-15T04:18:43Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2019-2692","initial_release_date":"2023-02-15T04:18:43Z","revision_history":[{"date":"2023-02-15T04:18:43Z","number":"2","summary":"Current version"},{"date":"2025-01-01T07:02:19Z","number":"3","summary":"Current version"},{"date":"2025-02-08T05:55:39Z","number":"4","summary":"Current version"},{"date":"2025-02-15T07:43:55Z","number":"5","summary":"Current version"},{"date":"2025-02-18T06:43:38Z","number":"6","summary":"Current version"},{"date":"2025-03-15T11:38:21Z","number":"7","summary":"Current version"},{"date":"2025-04-25T06:35:28Z","number":"8","summary":"Current version"},{"date":"2025-06-26T05:01:36Z","number":"9","summary":"Current version"},{"date":"2025-07-01T02:00:07Z","number":"10","summary":"Current version"}],"status":"interim","version":"10"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SLES for SAP Applications 11 SP3","product":{"name":"SLES for SAP Applications 11 SP3","product_id":"SLES for SAP Applications 11 SP3","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_sap:11:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1 for Teradata","product":{"name":"SUSE Linux Enterprise Server 11 SP1 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP1 for Teradata","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_teradata:11:sp1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP3 LTSS","product":{"name":"SUSE Linux Enterprise Server 11 SP3 LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3 LTSS","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_ltss:11:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product":{"name":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_teradata:11:sp3"}}},{"category":"product_version","name":"mysql","product":{"name":"mysql","product_id":"mysql","product_identification_helper":{"cpe":"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/mysql@?upstream=mysql.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"mysql as component of SLES for SAP Applications 11 SP3","product_id":"SLES for SAP Applications 11 SP3:mysql"},"product_reference":"mysql","relates_to_product_reference":"SLES for SAP Applications 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"mysql as component of SUSE Linux Enterprise Server 11 SP1 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP1 for Teradata:mysql"},"product_reference":"mysql","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1 for Teradata"},{"category":"default_component_of","full_product_name":{"name":"mysql as component of SUSE Linux Enterprise Server 11 SP3 LTSS","product_id":"SUSE Linux Enterprise Server 11 SP3 LTSS:mysql"},"product_reference":"mysql","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3 LTSS"},{"category":"default_component_of","full_product_name":{"name":"mysql as component of SUSE Linux Enterprise Server 11 SP3 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP3 for Teradata:mysql"},"product_reference":"mysql","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3 for Teradata"}]},"vulnerabilities":[{"cve":"CVE-2019-2692","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-2692"}],"notes":[{"category":"general","text":"Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","title":"CVE description"}],"product_status":{"known_not_affected":["SLES for SAP Applications 11 SP3:mysql","SUSE Linux Enterprise Server 11 SP1 for Teradata:mysql","SUSE Linux Enterprise Server 11 SP3 LTSS:mysql","SUSE Linux Enterprise Server 11 SP3 for Teradata:mysql"]},"references":[{"category":"external","summary":"CVE-2019-2692","url":"https://www.suse.com/security/cve/CVE-2019-2692"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"threats":[{"category":"impact","date":"2019-04-17T19:31:51Z","details":"important"}],"title":"CVE-2019-2692"}]}