Oracle MySQL 5.5.x < 5.5.51 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 9609

Synopsis

The remote database server is vulnerable to multiple attack vectors.

Description

The version of MySQL installed on the remote host is version 5.5.x prior to 5.5.51 and is affected by multiple issues :

- A flaw exists in the 'NAME_CONST()' function that is triggered during the handling of certain arguments. This may allow an authenticated attacker to crash the database.
- A flaw exists in a library used by MySQL. Specifically, the Henry Spencer regex Library (rxspencer) contains an overflow condition that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to cause a buffer overflow, resulting in an unspecified impact that may include a denial of service in a process linked against the library or potentially allow the execution of arbitrary code.
- An unspecified flaw exists related to the DML subcomponent. This may allow an authenticated remote attacker to cause a denial of service. No further details have been provided by the vendor.

Solution

Upgrade to MySQL 5.5.51 or later.

See Also

http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html

Plugin Details

Severity: High

ID: 9609

Family: Database

Published: 9/30/2016

Updated: 3/6/2019

Nessus ID: 93001, 93002

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:mysql

Patch Publication Date: 7/29/2015

Vulnerability Publication Date: 7/29/2016

Reference Information

CVE: CVE-2016-5612

BID: 93622