MySQL 5.6.x < 5.6.27 Multiple Vulnerabilities

high Nessus Plugin ID 86547

Synopsis

The remote database server is affected by multiple vulnerabilities.

Description

The version of MySQL running on the remote host is 5.6.x prior to 5.6.27. It is, therefore, potentially affected by the following vulnerabilities :

- A certificate validation bypass vulnerability exists in the Security:Encryption subcomponent due to a flaw in the X509_verify_cert() function in x509_vfy.c that is triggered when locating alternate certificate chains when the first attempt to build such a chain fails. A remote attacker can exploit this, by using a valid leaf certificate as a certificate authority (CA), to issue invalid certificates that will bypass authentication.
(CVE-2015-1793)

- An unspecified flaw exists in the Client Programs subcomponent. A local attacker can exploit this to gain elevated privileges. (CVE-2015-4819)

- An unspecified flaw exists in the Types subcomponent.
An authenticated, remote attacker can exploit this to gain access to sensitive information. (CVE-2015-4826)

- An unspecified flaws exist in the Security:Privileges subcomponent. An authenticated, remote attacker can exploit these to impact integrity. (CVE-2015-4830, CVE-2015-4864)

- An unspecified flaw exists in the DLM subcomponent.
An authenticated, remote attacker can exploit this to impact integrity. (CVE-2015-4879)

- An unspecified flaw exists in the Server Security Encryption subcomponent that allows an authenticated, remote attacker to disclose sensitive information.
(CVE-2015-7744)

Additionally, unspecified denial of service vulnerabilities can also exist in the following MySQL subcomponents :

- DDL (CVE-2015-4815)

- DML (CVE-2015-4858, CVE-2015-4862, CVE-2015-4905, CVE-2015-4913)

- InnoDB (CVE-2015-4861, CVE-2015-4866, CVE-2015-4895)

- libmysqld (CVE-2015-4904)

- Memcached (CVE-2015-4910)

- Optimizer (CVE-2015-4800)

- Parser (CVE-2015-4870)

- Partition (CVE-2015-4792, CVE-2015-4802, CVE-2015-4833)

- Query (CVE-2015-4807)

- Replication (CVE-2015-4890)

- Security : Firewall (CVE-2015-4766)

- Server : General (CVE-2016-0605)

- Security : Privileges (CVE-2015-4791)

- SP (CVE-2015-4836)

- Types (CVE-2015-4730)

Solution

Upgrade to MySQL version 5.6.27 or later as referenced in the October 2015 Oracle Critical Patch Update advisory.

See Also

http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-27.html

http://www.nessus.org/u?75a4a4fb

http://www.nessus.org/u?6405bf15

Plugin Details

Severity: High

ID: 86547

File Name: mysql_5_6_27.nasl

Version: 1.13

Type: remote

Family: Databases

Published: 10/22/2015

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Frictionless Assessment Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:oracle:mysql

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/30/2015

Vulnerability Publication Date: 7/9/2015

Reference Information

CVE: CVE-2015-1793, CVE-2015-4730, CVE-2015-4766, CVE-2015-4791, CVE-2015-4792, CVE-2015-4800, CVE-2015-4802, CVE-2015-4807, CVE-2015-4815, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864, CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890, CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910, CVE-2015-4913, CVE-2015-7744, CVE-2016-0605