MySQL Community Server 5.1 < 5.1.32 XPath Expression DoS

medium Nessus Network Monitor Plugin ID 4946

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The version of MySQL 5.1 installed on the remote host is earlier than 5.1.32 and is affected by a denial of service vulnerability. Specifically, a user can cause an assertion failure leading to a server crash by calling 'ExtractValue()' or 'UpdateXML()' using an XPath expression employing a scalar expression as a 'FilterExpr'.

Solution

Upgrade to version 5.1.32 or higher.

See Also

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html

http://bugs.mysql.com/bug.php?id=42495

Plugin Details

Severity: Medium

ID: 4946

Family: Database

Published: 3/5/2009

Updated: 3/6/2019

Nessus ID: 35766

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mysql:mysql

Reference Information

CVE: CVE-2009-0819

BID: 33972