MySQL 8.0.x < 8.0.26 Multiple Vulnerabilities (Jul 2021 CPU)

medium Nessus Plugin ID 151968
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote database server is affected by multiple vulnerabilities.

Description

The version of MySQL running on the remote host is 8.0.x prior to 8.0.26. It is, therefore, affected by multiple vulnerabilities, including the following, as noted in the July 2021 Critical Patch Update advisory:

- curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. (CVE-2021-22901)

- LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) (CVE-2019-17543)

- Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
(CVE-2021-2372)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to MySQL version 8.0.26 or later.

See Also

https://www.oracle.com/security-alerts/cpujul2021.html#AppendixMSQL

https://www.oracle.com/a/tech/docs/cpujul2021cvrf.xml

Plugin Details

Severity: Medium

ID: 151968

File Name: mysql_8_0_26.nasl

Version: 1.7

Type: combined

Agent: windows, macosx, unix

Family: Databases

Published: 7/22/2021

Updated: 10/22/2021

Dependencies: mysql_version.nasl, mysql_login.nasl, mysql_version_local.nasl, mysql_win_installed.nbin, macosx_mysql_installed.nbin

Risk Information

CVSS Score Source: CVE-2021-2417

VPR

Risk Factor: High

Score: 8.3

CVSS v2

Risk Factor: High

Base Score: 8

Temporal Score: 5.9

Vector: AV:N/AC:L/Au:S/C:P/I:P/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Medium

Base Score: 6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:mysql

Required KB Items: installed_sw/MySQL Server

Exploit Ease: No known exploits are available

Patch Publication Date: 7/20/2021

Vulnerability Publication Date: 7/20/2021

Reference Information

CVE: CVE-2019-17543, CVE-2021-2339, CVE-2021-2340, CVE-2021-2342, CVE-2021-2352, CVE-2021-2354, CVE-2021-2356, CVE-2021-2357, CVE-2021-2367, CVE-2021-2370, CVE-2021-2372, CVE-2021-2374, CVE-2021-2383, CVE-2021-2384, CVE-2021-2385, CVE-2021-2387, CVE-2021-2389, CVE-2021-2390, CVE-2021-2399, CVE-2021-2402, CVE-2021-2410, CVE-2021-2411, CVE-2021-2417, CVE-2021-2418, CVE-2021-2422, CVE-2021-2424, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2429, CVE-2021-2437, CVE-2021-2440, CVE-2021-2441, CVE-2021-3450, CVE-2021-22884, CVE-2021-22901, CVE-2021-25122, CVE-2021-35537, CVE-2021-35583, CVE-2021-35629

IAVA: 2021-A-0333, 2021-A-0487