MariaDB Server 10.0.x < 10.0.22 / 10.1.x < 10.1.9 Multiple DoS Vulnerabilities

Medium Nessus Network Monitor Plugin ID 9303

Synopsis

The remote database server is affected by multiple Denial of Service (DoS) attack vectors.

Description

MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 10.0.x earlier than 10.0.22 or 10.1.x earlier than 10.1.9, and is therefore affected by the following denial of service vulnerabilities :

- A denial of service vulnerability exists due to a flaw in the 'ha_partition::index_init()' function that is triggered when handling the priority queue. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash. (OSVDB 129715)
- A denial of service vulnerability exists due to a flaw in the 'Item_field::fix_outer_field()' function that is triggered when handling PREPARE statements. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash. (OSVDB 129716)
- A denial of service vulnerability exists due to a flaw in the 'handle_grant_struct()' function that is triggered when handling HASH updates. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash. (OSVDB 129719)
- A denial of service vulnerability exists due to a flaw in the 'is_invalid_role_name()' function that is triggered when handling ACLs with blank role names. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash. (OSVDB 129720)
- A denial of service vulnerability exists due to a flaw in the 'Item_direct_view_ref' class that is triggered when handling SELECT queries. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash. (OSVDB 129721)
- A denial of service vulnerability exists due to a flaw in the 'opt_sum_query()' function that is triggered when handling constant tables. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash. (OSVDB 129722)

Solution

Upgrade to version 10.1.9 or later. If version 10.1.x cannot be obtained, 10.0.22 is also patched for these issues.

See Also

https://blog.mariadb.org/mariadb-10-0-22-now-available

https://mariadb.com/kb/en/mariadb-1019-release-notes

https://mariadb.atlassian.net/browse/MDEV-8805

https://mariadb.atlassian.net/browse/MDEV-8614

https://mariadb.atlassian.net/browse/MDEV-8525

https://mariadb.atlassian.net/browse/MDEV-7930

Plugin Details

Severity: Medium

ID: 9303

Family: Database

Published: 2016/05/13

Modified: 2016/12/12

Dependencies: 8693

Nessus ID: 84796

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 6.5

Temporal Score: 6

Vector: CVSS3#AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Patch Publication Date: 2015/10/30

Vulnerability Publication Date: 2015/08/13