U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-3163

Change History

Modified Analysis by NIST 6/27/2022 12:27:27 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:* versions from (including) 2.0.0 up to (including) 2.3.0
     *cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:* versions from (including) 3.0.0 up to (including) 3.1.1
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* versions up to (including) 5.5.26
OR
     *cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* versions from (including) 5.1 up to (excluding) 5.1.66
     *cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* versions from (including) 5.5.0 up to (excluding) 5.5.27
Changed CPE Configuration
OR
     *cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*
     *cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*
     *cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*
     *cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*
     *cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*
     *cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* versions up to (including) 5.1.64
OR
     *cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* versions from (including) 5.1.0 up to (including) 5.1.64
     *cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* versions from (including) 5.5.0 up to (including) 5.5.26
Removed Evaluator Impact
Per: http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html

"The CVSS Base Score is 9.0 only for Windows. For Linux, Unix and other platforms, the CVSS Base Score is 6.5, and the impacts for Confidentiality, Integrity and Availability are Partial+."

								
						
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2012-1462.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2012-1462.html Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/51177 No Types Assigned
http://secunia.com/advisories/51177 Not Applicable
Changed Reference Type
http://secunia.com/advisories/51309 No Types Assigned
http://secunia.com/advisories/51309 Not Applicable
Changed Reference Type
http://secunia.com/advisories/53372 No Types Assigned
http://secunia.com/advisories/53372 Not Applicable
Changed Reference Type
http://secunia.com/advisories/56509 No Types Assigned
http://secunia.com/advisories/56509 Not Applicable
Changed Reference Type
http://secunia.com/advisories/56513 No Types Assigned
http://secunia.com/advisories/56513 Not Applicable
Changed Reference Type
http://security.gentoo.org/glsa/glsa-201308-06.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-201308-06.xml Third Party Advisory
Changed Reference Type
http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html No Types Assigned
http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2012/dsa-2581 No Types Assigned
http://www.debian.org/security/2012/dsa-2581 Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html Patch, Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html Patch, Third Party Advisory
Changed Reference Type
http://www.ubuntu.com/usn/USN-1621-1 No Types Assigned
http://www.ubuntu.com/usn/USN-1621-1 Third Party Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/79381 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/79381 Third Party Advisory, VDB Entry