Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Oracle MySQL 5.7.x < 5.7.8 Multiple Vulnerabilities

Medium

Synopsis

The remote database server is vulnerable to multiple attack vectors.

Description

The version of MySQL installed on the remote host is version 5.7.x prior to 5.7.8 and is affected by multiple issues :

- A flaw exists in the 'my_print_defaults()' function that is due to the program storing output in plaintext. This may allow a local attacker to gain access to password information. (OSVDB 125742) - A flaw exists in InnoDB that is triggered during the handling of a spatial index in an ALTER TABLE operation. This may allow an authenticated attacker to cause the server to exit. (OSVDB 125743) - An invalid memory pointer access flaw exists that is triggered when accessing the Performance Schema 'events_statements_history' table. This may allow an authenticated attacker to cause the server to exit. (OSVDB 125744) - A flaw exists that may allow an attacker with an expired password to execute arbitrary ALTER USER statements. This may allow the attacker to gain limited elevated privileges. (OSVDB 125745) - An off-by-one error exists in the string-copying functionality. The issue is triggered as user-supplied input is not properly sanitized. This may allow an authenticated attacker to cause a limited buffer overflow, which can result in a denial of service or potentially allowing the execution of arbitrary code. (OSVDB 125746) - A flaw exists that is triggered when handling view column access after DDL or FLUSH TABLES statements in a stored procedure. This may allow an authenticated attacker to cause the server to exit. (OSVDB 125747) - A flaw exists that is triggered when handling GROUP BY or ORDER BY statements in CHAR(0) NOT NULL columns. This may allow an authenticated attacker to cause the server to exit. (OSVDB 125748)

Solution

Upgrade to MySQL 5.7.8 or later.