Oracle MySQL 5.7.x < 5.7.11 DoS

Medium Nessus Network Monitor Plugin ID 9242

Synopsis

The remote database server is vulnerable to a Denial of Service (DoS) attack.

Description

The version of MySQL installed on the remote host is version 5.7.x prior to 5.7.11 and is affected by multiple issues :

- A denial of service vulnerability exists in the bundled OpenSSL library due to improper handling of variables declared as TEXT or BLOB. An authenticated, remote attacker can exploit this to corrupt data or cause a denial of service condition. (OSVDB 134892)
- A denial of service vulnerability exists that is triggered when handling a 'CREATE TEMPORARY TABLE .. SELECT' statement involving BIT columns. An authenticated, remote attacker can exploit this to create an improper table or cause the server to exit, resulting in a denial of service condition. (OSVDB 134893)
- A flaw exists that is triggered during the handling of queries that contain 'WHERE 0'. This may allow an authenticated attacker to cause an uninitialized read, which can cause the server to exit. (OSVDB 134896)

Solution

Upgrade to MySQL 5.7.11 or later.

See Also

http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-11.html

Plugin Details

Severity: Medium

ID: 9242

Family: Database

Published: 2016/04/15

Modified: 2016/05/17

Dependencies: 8914

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 6.5

Temporal Score: 6.2

Vector: CVSS3#AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:mysql

Patch Publication Date: 2015/02/02

Vulnerability Publication Date: 2015/02/05