MariaDB Server 10.1.x < 10.1.14 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 9453

Synopsis

The remote database server is affected by multiple attack vectors.

Description

MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 10.1.x earlier than 10.1.14, and is therefore affected by multiple vulnerabilities :

- A flaw exists in the 'my_decimal_precision_to_length_no_truncation()' function in 'item_cmpfunc.cc' that is triggered when handling SELECT CASE statements. This may allow an authenticated attacker to crash the database.
- A heap corruption flaw exists related to 'main.shm' in the 'handle_connections_shared_memory()' function in 'mysqld.cc' that is triggered as input is not properly sanitized. This may allow an authenticated attacker to crash the database.
- An overflow condition exists in the 'ha_connect::ha_connect()' function in 'storage/connect/ha_connect.cc'. The issue is triggered as user-supplied input is not properly validated when handling partnames. This may allow an authenticated attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
- A flaw exists in 'sql_insert.cc' that is triggered during the handling of INSERT or REPLACE DELAYED statements. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'cli_read_prepare_result()' function in 'libmysql/libmysql.c' in the Embedded Server that is triggered when handling a CREATE TABLE statement. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'acl_load()' function in 'sql_acl.cc' that is triggered when handling user tables. This may allow a local attacker to crash the database.
- A flaw exists in the 'cost_group_min_max()' function in 'opt_range.cc' that is triggered when handling a GROUP BY clause. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'Item_subselect::is_expensive()' function in 'item_subselect.cc' that is triggered when handling a UNION query. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'validate_password()' function in 'sql_acl.cc' that is triggered when handling NULL passwords. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'Item_func_match::fix_index()' function in 'sql/item_func.cc' that is triggered during the handling a full-text search of the 'utf8mb4' column. This may allow an authenticated attacker to crash the database.

Solution

Upgrade to version 10.1.14 or later.

See Also

https://mariadb.com/kb/en/mariadb-10114-release-notes

https://jira.mariadb.org/browse/MDEV-8889

https://jira.mariadb.org/browse/MDEV-9487

https://jira.mariadb.org/browse/MDEV-9602

https://jira.mariadb.org/browse/MDEV-9779

https://jira.mariadb.org/browse/MDEV-9851

https://jira.mariadb.org/browse/MDEV-9986

https://jira.mariadb.org/browse/MDEV-10034

Plugin Details

Severity: High

ID: 9453

Family: Database

Published: 8/5/2016

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Patch Publication Date: 6/7/2016

Vulnerability Publication Date: 10/2/2015