MariaDB Server 5.5.x < 5.5.49 Multiple DoS

high Nessus Network Monitor Plugin ID 9451

Synopsis

The remote database server is affected by multiple Denial of Service (DoS) attack vectors.

Description

MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 5.5.x earlier than 5.5.49, and is therefore affected by multiple vulnerabilities :

- A flaw exists in the 'my_decimal_precision_to_length_no_truncation()' function in 'item_cmpfunc.cc' that is triggered when handling SELECT CASE statements. This may allow an authenticated attacker to crash the database.
- An overflow condition exists in the 'audit_plugin_so_init()' function in 'plugin/server_audit/server_audit.c'. The issue is triggered as user-supplied input is not properly validated. This may allow an authenticated attacker to cause a buffer overflow, resulting in an unspecified impact that may include a denial of service or potentially allowing the execution of arbitrary code.

Solution

Upgrade to version 5.5.49 or later.

See Also

https://mariadb.org/mariadb-5-5-49-updated-connectors-now-available

https://jira.mariadb.org/browse/MDEV-9662

https://jira.mariadb.org/browse/MDEV-9745

Plugin Details

Severity: High

ID: 9451

Family: Database

Published: 8/5/2016

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Patch Publication Date: 4/17/2016

Vulnerability Publication Date: 2/15/2016