CVE-2010-3840

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points.

References

http://bugs.mysql.com/bug.php?id=51875

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html

http://lists.mysql.com/commits/117094

http://secunia.com/advisories/42875

http://secunia.com/advisories/42936

http://www.debian.org/security/2011/dsa-2143

http://www.mandriva.com/security/advisories?name=MDVSA-2010:222

http://www.mandriva.com/security/advisories?name=MDVSA-2010:223

http://www.redhat.com/support/errata/RHSA-2010-0824.html

http://www.redhat.com/support/errata/RHSA-2010-0825.html

http://www.redhat.com/support/errata/RHSA-2011-0164.html

http://www.securityfocus.com/bid/43676

http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt

http://www.ubuntu.com/usn/USN-1017-1

http://www.ubuntu.com/usn/USN-1397-1

http://www.vupen.com/english/advisories/2011/0105

http://www.vupen.com/english/advisories/2011/0170

http://www.vupen.com/english/advisories/2011/0345

https://bugzilla.redhat.com/show_bug.cgi?id=640865

https://exchange.xforce.ibmcloud.com/vulnerabilities/64838

Details

Source: MITRE

Published: 2011-01-14

Updated: 2019-12-17

Risk Information

CVSS v2

Base Score: 4

Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*

Tenable Plugins

View all (28 total)

IDNameProductFamilySeverity
75905openSUSE Security Update : libmysqlclusterclient16 (openSUSE-SU-2011:0799-1)NessusSuSE Local Security Checks
medium
75904openSUSE Security Update : libmysqlclient-devel (openSUSE-SU-2011:1250-1)NessusSuSE Local Security Checks
medium
75898openSUSE Security Update : libmariadbclient16 (openSUSE-SU-2011:0743-1)NessusSuSE Local Security Checks
medium
75590openSUSE Security Update : libmysqlclusterclient16 (openSUSE-SU-2011:0774-1)NessusSuSE Local Security Checks
medium
75589openSUSE Security Update : libmysqlclient-devel (openSUSE-SU-2011:1250-1)NessusSuSE Local Security Checks
medium
75582openSUSE Security Update : libmariadbclient16 (openSUSE-SU-2011:0743-1)NessusSuSE Local Security Checks
medium
68184Oracle Linux 6 : mysql (ELSA-2011-0164)NessusOracle Linux Local Security Checks
medium
68134Oracle Linux 5 : mysql (ELSA-2010-0825)NessusOracle Linux Local Security Checks
medium
68133Oracle Linux 4 : mysql (ELSA-2010-0824)NessusOracle Linux Local Security Checks
medium
60940Scientific Linux Security Update : mysql on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60884Scientific Linux Security Update : mysql on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60883Scientific Linux Security Update : mysql on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
medium
58325Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1397-1)NessusUbuntu Local Security Checks
high
57446GLSA-201201-02 : MySQL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
57115SuSE 11.1 Security Update : MySQL (SAT Patch Number 5285)NessusSuSE Local Security Checks
medium
57114SuSE 11.1 Security Update : MySQL (SAT Patch Number 5285)NessusSuSE Local Security Checks
medium
51571RHEL 6 : mysql (RHSA-2011:0164)NessusRed Hat Local Security Checks
medium
51530Debian DSA-2143-1 : mysql-dfsg-5.0 - several vulnerabilitiesNessusDebian Local Security Checks
medium
50806CentOS 5 : mysql (CESA-2010:0825)NessusCentOS Local Security Checks
medium
50805CentOS 4 : mysql (CESA-2010:0824)NessusCentOS Local Security Checks
medium
50573Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1017-1)NessusUbuntu Local Security Checks
medium
50534Mandriva Linux Security Advisory : mysql (MDVSA-2010:223)NessusMandriva Local Security Checks
medium
50533Mandriva Linux Security Advisory : mysql (MDVSA-2010:222)NessusMandriva Local Security Checks
medium
50474RHEL 5 : mysql (RHSA-2010:0825)NessusRed Hat Local Security Checks
medium
50473RHEL 4 : mysql (RHSA-2010:0824)NessusRed Hat Local Security Checks
medium
801142MySQL Community Server 5.1 < 5.1.51 Multiple Denial of Service VulnerabilitiesLog Correlation EngineDatabase
medium
5677MySQL Community Server 5.1 < 5.1.51 Multiple Denial of Service VulnerabilitiesNessus Network MonitorDatabase
medium
49711MySQL Community Server < 5.1.51 Multiple VulnerabilitiesNessusDatabases
medium