Oracle MySQL 5.7.x < 5.7.11 DoS

medium Nessus Network Monitor Plugin ID 9242

Synopsis

The remote database server is vulnerable to a Denial of Service (DoS) attack.

Description

The version of MySQL installed on the remote host is version 5.7.x prior to 5.7.11 and is affected by multiple issues :

- A denial of service vulnerability exists in the bundled OpenSSL library due to improper handling of variables declared as TEXT or BLOB. An authenticated, remote attacker can exploit this to corrupt data or cause a denial of service condition.
- A denial of service vulnerability exists that is triggered when handling a 'CREATE TEMPORARY TABLE .. SELECT' statement involving BIT columns. An authenticated, remote attacker can exploit this to create an improper table or cause the server to exit, resulting in a denial of service condition.
- A flaw exists that is triggered during the handling of queries that contain 'WHERE 0'. This may allow an authenticated attacker to cause an uninitialized read, which can cause the server to exit.

Solution

Upgrade to MySQL 5.7.11 or later.

See Also

http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-11.html

Plugin Details

Severity: Medium

ID: 9242

Family: Database

Published: 4/15/2016

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:mysql

Patch Publication Date: 2/2/2015

Vulnerability Publication Date: 2/5/2015