MariaDB Server 10.1.x < 10.1.10 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 9291

Synopsis

The remote database server is affected by multiple attack vectors.

Description

MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 10.1.x earlier than 10.1.10, and is therefore affected by multiple vulnerabilities :

- A race condition exists as 'debian.cnf' is created with world-readable permissions for a small period of time during initial installation. This may allow a local attacker to gain knowledge of the 'debian-sys-maint' password.
- A flaw exists in 'wsrep_sst_xtrabackup-v2.sh' as certificates are not properly validated. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. MiTM, DNS cache poisoning) can disclose and optionally manipulate transmitted data.

Solution

Upgrade to version 10.1.10 or later.

See Also

https://mariadb.com/kb/en/mariadb/mariadb-10110-changelog

https://mariadb.atlassian.net/browse/MDEV-9081

https://mariadb.atlassian.net/browse/MDEV-9141

Plugin Details

Severity: Medium

ID: 9291

Family: Database

Published: 5/13/2016

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Patch Publication Date: 12/24/2015

Vulnerability Publication Date: 11/17/2015