MariaDB Server 10.1.x < 10.1.10 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 9291

Synopsis

The remote database server is affected by multiple attack vectors.

Description

MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 10.1.x earlier than 10.1.10, and is therefore affected by multiple vulnerabilities :

- A race condition exists as 'debian.cnf' is created with world-readable permissions for a small period of time during initial installation. This may allow a local attacker to gain knowledge of the 'debian-sys-maint' password. (OSVDB 132246)
- A flaw exists in 'wsrep_sst_xtrabackup-v2.sh' as certificates are not properly validated. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. MiTM, DNS cache poisoning) can disclose and optionally manipulate transmitted data. (OSVDB 134560)

Solution

Upgrade to version 10.1.10 or later.

See Also

https://mariadb.com/kb/en/mariadb/mariadb-10110-changelog

https://mariadb.atlassian.net/browse/MDEV-9081

https://mariadb.atlassian.net/browse/MDEV-9141

Plugin Details

Severity: Medium

ID: 9291

Family: Database

Published: 2016/05/13

Modified: 2016/12/12

Dependencies: 8693

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 4.8

Temporal Score: 4.5

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Patch Publication Date: 2015/12/24

Vulnerability Publication Date: 2015/11/17