MongoDB < 2.3.2 BSON Object Length Handling Memory Disclosure

Medium Nessus Plugin ID 72334

Synopsis

The remote database server is affected by an information disclosure vulnerability.

Description

The version of the remote MongoDB server is a version prior to 2.3.2. It is, therefore, potentially affected by an information disclosure vulnerability. An error exists related to handling BSON (Binary JavaScript Object Notation) objects having incorrect length that could allow possible disclosure of information held in memory.

Solution

Upgrade to MongoDB 2.3.2 / 2.4.0 or later. Alternatively, use the '--objcheck' command line switch to force object checking.

Note that version 2.3.2 is a development version and is not recommended for production use.

See Also

https://www.mongodb.com/alerts#security-related

http://www.nessus.org/u?4cbacf08

https://jira.mongodb.org/browse/SERVER-7769

http://article.gmane.org/gmane.comp.security.oss.general/11822

http://blog.ptsecurity.com/2012/11/attacking-mongodb_26.html

Plugin Details

Severity: Medium

ID: 72334

File Name: mongodb_2_3_2.nasl

Version: 1.7

Type: remote

Family: Databases

Published: 2014/02/05

Updated: 2019/11/26

Dependencies: 65914

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2012-6619

CVSS v2.0

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mongodb:mongodb

Required KB Items: Services/mongodb, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/11/27

Vulnerability Publication Date: 2012/11/26

Reference Information

CVE: CVE-2012-6619

BID: 64687