MariaDB Server 10.2.x < 10.2.5 Multiple DoS

medium Nessus Network Monitor Plugin ID 700001

Synopsis

The remote database server is affected by multiple Denial of Service (DoS) attack vectors.

Description

The version of MariaDB installed on the remote host is 10.2.x prior to 10.2.5, and is affected by multiple vulnerabilities :

- A flaw exists in the 'JOIN_CACHE::create_remaining_fields()' function in 'sql_join_cache.cc' that is triggered when handling data caching. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'find_field_in_tables()' function in 'sql_base.cc' that is triggered during the handling of stored procedures in 'EXISTS' queries. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'JOIN::drop_unused_derived_keys()' function in 'sql_select.cc' that is triggered during the handling of a specially crafted 'SELECT' statement. This may allow an authenticated attacker to crash the database.- A flaw exists in the 'field_list_item()' function in 'sql_yacc.yy' that is triggered as user variables in CHECK queries are not properly handled. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'Item_json_func_remove::val_str()' function in 'item_jsonfunc.cc' that is triggered during the handling of null_value. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'find_dup_table()' function in 'sql_base.cc' that is triggered during the materialization of derived tables. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'mysql_admin_table()' function in 'sql_admin.cc' that is triggered during the handling of specially crafted ANALYZE statements. This may allow an authenticated attacker to crash the database.
- A flaw exists that is triggered during the handling of a specially crated query for CREATE TABLE with an invalid default. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'Item_copy' class in 'item.h' that is triggered during the handling of a subquery for the post-GROUP-BY context. This may allow an authenticated attacker to crash the database.

Solution

Upgrade to version 10.2.5 or later.

See Also

https://jira.mariadb.org/browse/MDEV-11525

Plugin Details

Severity: Medium

ID: 700001

Family: Database

Published: 3/13/2017

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Patch Publication Date: 3/8/2017

Vulnerability Publication Date: 12/9/2016