APP: Oracle MySQL Cluster Data Node GSN_SYNC_PATH_REQ Parsing Integer Underflow

This signature detects attempts to exploit a known vulnerability against Oracle MySQL Cluster Data Node. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.36 and prior, 7.5.26 and prior, 7.6.22 and prior and and 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

Affected Products

Oracle mysql_cluster

Short Name
APP:ORACLE:MYSQL-DN-BUFOVRFW
Severity
Major
Recommended
True
Recommended Action
Drop
Category
APP
Keywords
CVE-2022-21550 Cluster Data GSN_SYNC_PATH_REQ Integer MySQL Node Oracle Parsing Underflow
Release Date
01/23/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3565
Port
TCP/2202
False Positive
Unknown
Vendors

Oracle

Netapp

Found a potential security threat?