Oracle MySQL 5.7.x < 5.7.13 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 9616

Synopsis

The remote database server is vulnerable to multiple attack vectors.

Description

The version of MySQL installed on the remote host is version 5.7.x prior to 5.7.13 and is affected by multiple issues :

- Multiple flaws exist in InnoDB that are triggered when handling specially crafted 'ALTER TABLE' operations. This may allow an authenticated attacker to potentially crash the database.
- Multiple unspecified overflow conditions exist that are triggered as user-supplied input is not properly validated. This may allow an authenticated attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
- A NULL pointer dereference flaw exists in a parser structure that is triggered during the validation of stored procedure names. This may allow an authenticated attacker to potentially cause the database to crash.
- Multiple unspecified overflow conditions exist in the InnoDB memcached plugin that are triggered as user-supplied input is not properly validated. This may allow an authenticated attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
- A flaw exists that is triggered when invoking Enterprise Encryption functions in multiple threads simultaneously or after creating and dropping them. This may allow an authenticated attacker to potentially crash the database.
- A flaw exists that is triggered when handling a 'SELECT ... GROUP BY ... FOR UPDATE' query executed with a Loose Index Scan. This may allow an authenticated attacker to potentially crash the database.
- A flaw exists that is triggered when performing a 'FLUSH TABLES' operation on a table with a discarded tablespace. This may potentially allow an authenticated attacker to cause the database to crash.
- A flaw exists in InnoDB that is triggered when performing an 'OPTIMIZE TABLE' operation on a table with a full-text index. This may allow an authenticated attacker to crash the database.
- A flaw exists that is triggered when performing an 'UPDATE' operation on a generated virtual BLOB column. This may potentially allow an authenticated attacker to cause the database to crash.
- A flaw exists that is triggered when performing a 'SHOW CREATE TABLE' operation on a table with a generated column. This may potentially allow an authenticated attacker to cause the database to crash.
- An unspecified flaw exists related to the InnoDB Plugin subcomponent. This may allow an authenticated remote attacker to have an impact on integrity. No further details have been provided by the vendor.

Solution

Upgrade to MySQL 5.7.13 or later.

See Also

http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-13.html

Plugin Details

Severity: High

ID: 9616

Family: Database

Published: 9/30/2016

Updated: 3/6/2019

Nessus ID: 91997, 91998

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:mysql

Patch Publication Date: 6/2/2016

Vulnerability Publication Date: 6/2/2016

Reference Information

CVE: CVE-2016-8288

BID: 93740