Description
The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1079-1 | libdbd-mysql-perl security update |
EUVD |
EUVD-2017-2434 | The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. |
Ubuntu USN |
USN-5344-1 | DBD::mysql vulnerabilities |
Ubuntu USN |
USN-7417-1 | libdbd-mysql-perl vulnerabilities |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T17:50:12.094Z
Reserved: 2017-07-01T00:00:00.000Z
Link: CVE-2017-10789
No data.
Status : Modified
Published: 2017-07-01T18:29:00.237
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-10789
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN