EulerOS 2.0 SP1 : mariadb (EulerOS-SA-2016-1011)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote EulerOS host is missing multiple security updates.

Description :

According to the versions of the mariadb packages installed, the
EulerOS installation on the remote host is affected by the following
vulnerabilities :

- It was found that the MariaDB client library did not
properly check host names against server identities
noted in the X.509 certificates when establishing
secure connections using TLS/SSL. A man-in-the-middle
attacker could possibly use this flaw to impersonate a
server to a client. (CVE-2016-2047)

- This update fixes several vulnerabilities in the
MariaDB database server. Information about these flaws
can be found on the Oracle Critical Patch Update
Advisory page, listed in the References
section.(CVE-2015-4792, CVE-2015-4802, CVE-2015-4815,
CVE-2015-4816, CVE-2015-4819, CVE-2015-4826,
CVE-2015-4830, CVE-2015-4836, CVE-2015-4858,
CVE-2015-4861, CVE-2015-4870, CVE-2015-4879,
CVE-2015-4913, CVE-2016-0505, CVE-2016-0546,
CVE-2016-0596, CVE-2016-0597, CVE-2016-0598,
CVE-2016-0600, CVE-2016-0606, CVE-2016-0608,
CVE-2016-0609, CVE-2016-0616)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?149ef326

Solution :

Update the affected mariadb packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false